Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/mail-client/thunderbird-bin@38.5.0
Typeebuild
Namespacemail-client
Namethunderbird-bin
Version38.5.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version38.7.0
Latest_non_vulnerable_version128.9.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1b4y-74dy-bfg3
vulnerability_id VCID-1b4y-74dy-bfg3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2738.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2738
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.79343
published_at 2026-04-13T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79293
published_at 2026-04-01T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.793
published_at 2026-04-02T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79324
published_at 2026-04-04T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.7931
published_at 2026-04-07T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-08T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.79345
published_at 2026-04-09T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79369
published_at 2026-04-11T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2738
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1b4y-74dy-bfg3
1
url VCID-1k4n-9zjx-d3bu
vulnerability_id VCID-1k4n-9zjx-d3bu
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2736.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2736.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2736
reference_id
reference_type
scores
0
value 0.01193
scoring_system epss
scoring_elements 0.78856
published_at 2026-04-13T12:55:00Z
1
value 0.01193
scoring_system epss
scoring_elements 0.78807
published_at 2026-04-01T12:55:00Z
2
value 0.01193
scoring_system epss
scoring_elements 0.78814
published_at 2026-04-02T12:55:00Z
3
value 0.01193
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-04T12:55:00Z
4
value 0.01193
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-07T12:55:00Z
5
value 0.01193
scoring_system epss
scoring_elements 0.78852
published_at 2026-04-08T12:55:00Z
6
value 0.01193
scoring_system epss
scoring_elements 0.78858
published_at 2026-04-09T12:55:00Z
7
value 0.01193
scoring_system epss
scoring_elements 0.78882
published_at 2026-04-11T12:55:00Z
8
value 0.01193
scoring_system epss
scoring_elements 0.78865
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2736
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2736
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k4n-9zjx-d3bu
2
url VCID-1p76-9qmf-bqgm
vulnerability_id VCID-1p76-9qmf-bqgm
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2727
reference_id
reference_type
scores
0
value 0.01076
scoring_system epss
scoring_elements 0.77799
published_at 2026-04-13T12:55:00Z
1
value 0.01076
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-01T12:55:00Z
2
value 0.01076
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-02T12:55:00Z
3
value 0.01076
scoring_system epss
scoring_elements 0.77773
published_at 2026-04-04T12:55:00Z
4
value 0.01076
scoring_system epss
scoring_elements 0.77757
published_at 2026-04-07T12:55:00Z
5
value 0.01076
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-08T12:55:00Z
6
value 0.01076
scoring_system epss
scoring_elements 0.7779
published_at 2026-04-09T12:55:00Z
7
value 0.01076
scoring_system epss
scoring_elements 0.77816
published_at 2026-04-11T12:55:00Z
8
value 0.01076
scoring_system epss
scoring_elements 0.778
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2727
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236950
reference_id 1236950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236950
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727
reference_id CVE-2015-2727
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-60
reference_id mfsa2015-60
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-60
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2727
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1p76-9qmf-bqgm
3
url VCID-28k4-mp17-xbcu
vulnerability_id VCID-28k4-mp17-xbcu
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0806.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0806
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0806
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
reference_id 1207078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806
reference_id CVE-2015-0806
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
reference_id mfsa2015-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0806
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-28k4-mp17-xbcu
4
url VCID-2v2n-95e7-d7gw
vulnerability_id VCID-2v2n-95e7-d7gw
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7210.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7210.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7210
reference_id
reference_type
scores
0
value 0.01773
scoring_system epss
scoring_elements 0.82663
published_at 2026-04-13T12:55:00Z
1
value 0.01773
scoring_system epss
scoring_elements 0.82597
published_at 2026-04-01T12:55:00Z
2
value 0.01773
scoring_system epss
scoring_elements 0.82674
published_at 2026-04-11T12:55:00Z
3
value 0.01773
scoring_system epss
scoring_elements 0.82668
published_at 2026-04-12T12:55:00Z
4
value 0.01773
scoring_system epss
scoring_elements 0.82611
published_at 2026-04-02T12:55:00Z
5
value 0.01773
scoring_system epss
scoring_elements 0.82626
published_at 2026-04-04T12:55:00Z
6
value 0.01773
scoring_system epss
scoring_elements 0.82622
published_at 2026-04-07T12:55:00Z
7
value 0.01773
scoring_system epss
scoring_elements 0.82648
published_at 2026-04-08T12:55:00Z
8
value 0.01773
scoring_system epss
scoring_elements 0.82656
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7210
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1218326
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1218326
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
21
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
22
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-138.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-138.html
23
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
24
reference_url http://www.securityfocus.com/bid/79283
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79283
25
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
26
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291585
reference_id 1291585
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291585
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7210
reference_id CVE-2015-7210
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7210
44
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-138
reference_id mfsa2015-138
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-138
46
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
47
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7210
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v2n-95e7-d7gw
5
url VCID-2w9f-avet-g7c5
vulnerability_id VCID-2w9f-avet-g7c5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7181.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7181
reference_id
reference_type
scores
0
value 0.05021
scoring_system epss
scoring_elements 0.89731
published_at 2026-04-13T12:55:00Z
1
value 0.05021
scoring_system epss
scoring_elements 0.89689
published_at 2026-04-01T12:55:00Z
2
value 0.05021
scoring_system epss
scoring_elements 0.8974
published_at 2026-04-11T12:55:00Z
3
value 0.05021
scoring_system epss
scoring_elements 0.89738
published_at 2026-04-12T12:55:00Z
4
value 0.05021
scoring_system epss
scoring_elements 0.89692
published_at 2026-04-02T12:55:00Z
5
value 0.05021
scoring_system epss
scoring_elements 0.89706
published_at 2026-04-04T12:55:00Z
6
value 0.05021
scoring_system epss
scoring_elements 0.89709
published_at 2026-04-07T12:55:00Z
7
value 0.05021
scoring_system epss
scoring_elements 0.89726
published_at 2026-04-08T12:55:00Z
8
value 0.05021
scoring_system epss
scoring_elements 0.89733
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7181
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
34
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
35
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
36
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
37
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
38
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
39
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
40
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
44
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77416
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77416
48
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
49
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
50
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
51
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
52
reference_url http://www.ubuntu.com/usn/USN-2791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2791-1
53
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269345
reference_id 1269345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269345
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7181
reference_id CVE-2015-7181
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7181
67
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
68
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
69
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
70
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
71
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
72
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
73
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
74
reference_url https://usn.ubuntu.com/2791-1/
reference_id USN-2791-1
reference_type
scores
url https://usn.ubuntu.com/2791-1/
75
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@3.22.2
purl pkg:ebuild/mail-client/thunderbird-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2
1
url pkg:ebuild/mail-client/thunderbird-bin@4.12
purl pkg:ebuild/mail-client/thunderbird-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12
2
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
3
url pkg:ebuild/mail-client/thunderbird-bin@38.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0
aliases CVE-2015-7181
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2w9f-avet-g7c5
6
url VCID-3mb3-bgdt-jfgv
vulnerability_id VCID-3mb3-bgdt-jfgv
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0814.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0814.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0814
reference_id
reference_type
scores
0
value 0.01881
scoring_system epss
scoring_elements 0.8315
published_at 2026-04-13T12:55:00Z
1
value 0.01881
scoring_system epss
scoring_elements 0.83085
published_at 2026-04-01T12:55:00Z
2
value 0.01881
scoring_system epss
scoring_elements 0.83101
published_at 2026-04-02T12:55:00Z
3
value 0.01881
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-04T12:55:00Z
4
value 0.01881
scoring_system epss
scoring_elements 0.83113
published_at 2026-04-07T12:55:00Z
5
value 0.01881
scoring_system epss
scoring_elements 0.83137
published_at 2026-04-08T12:55:00Z
6
value 0.01881
scoring_system epss
scoring_elements 0.83145
published_at 2026-04-09T12:55:00Z
7
value 0.01881
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-11T12:55:00Z
8
value 0.01881
scoring_system epss
scoring_elements 0.83155
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0814
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207070
reference_id 1207070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207070
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814
reference_id CVE-2015-0814
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
reference_id mfsa2015-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0814
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3mb3-bgdt-jfgv
7
url VCID-3sp3-efj9-5qaj
vulnerability_id VCID-3sp3-efj9-5qaj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7198.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7198.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7198
reference_id
reference_type
scores
0
value 0.03921
scoring_system epss
scoring_elements 0.88308
published_at 2026-04-13T12:55:00Z
1
value 0.03921
scoring_system epss
scoring_elements 0.88252
published_at 2026-04-01T12:55:00Z
2
value 0.03921
scoring_system epss
scoring_elements 0.88305
published_at 2026-04-09T12:55:00Z
3
value 0.03921
scoring_system epss
scoring_elements 0.88316
published_at 2026-04-11T12:55:00Z
4
value 0.03921
scoring_system epss
scoring_elements 0.8826
published_at 2026-04-02T12:55:00Z
5
value 0.03921
scoring_system epss
scoring_elements 0.88275
published_at 2026-04-04T12:55:00Z
6
value 0.03921
scoring_system epss
scoring_elements 0.8828
published_at 2026-04-07T12:55:00Z
7
value 0.03921
scoring_system epss
scoring_elements 0.883
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7198
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1188010
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1188010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
29
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
30
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
31
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
34
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
35
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
36
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
37
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277350
reference_id 1277350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277350
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7198
reference_id CVE-2015-7198
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7198
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-131
reference_id mfsa2015-131
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-131
51
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
52
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
53
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
54
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7198
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sp3-efj9-5qaj
8
url VCID-42u7-k34s-eug1
vulnerability_id VCID-42u7-k34s-eug1
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7188.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7188.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7188
reference_id
reference_type
scores
0
value 0.01664
scoring_system epss
scoring_elements 0.82085
published_at 2026-04-13T12:55:00Z
1
value 0.01664
scoring_system epss
scoring_elements 0.8202
published_at 2026-04-01T12:55:00Z
2
value 0.01664
scoring_system epss
scoring_elements 0.82102
published_at 2026-04-11T12:55:00Z
3
value 0.01664
scoring_system epss
scoring_elements 0.82092
published_at 2026-04-12T12:55:00Z
4
value 0.01664
scoring_system epss
scoring_elements 0.82032
published_at 2026-04-02T12:55:00Z
5
value 0.01664
scoring_system epss
scoring_elements 0.82054
published_at 2026-04-04T12:55:00Z
6
value 0.01664
scoring_system epss
scoring_elements 0.82049
published_at 2026-04-07T12:55:00Z
7
value 0.01664
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-08T12:55:00Z
8
value 0.01664
scoring_system epss
scoring_elements 0.82083
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7188
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1199430
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1199430
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
28
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
29
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
30
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-122.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-122.html
31
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
32
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
33
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
34
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
35
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
36
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277343
reference_id 1277343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277343
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7188
reference_id CVE-2015-7188
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7188
48
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-122
reference_id mfsa2015-122
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-122
50
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
51
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
52
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7188
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42u7-k34s-eug1
9
url VCID-4ug8-hyz3-1uam
vulnerability_id VCID-4ug8-hyz3-1uam
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7212.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7212.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7212
reference_id
reference_type
scores
0
value 0.02306
scoring_system epss
scoring_elements 0.84752
published_at 2026-04-13T12:55:00Z
1
value 0.02306
scoring_system epss
scoring_elements 0.84678
published_at 2026-04-01T12:55:00Z
2
value 0.02306
scoring_system epss
scoring_elements 0.84762
published_at 2026-04-11T12:55:00Z
3
value 0.02306
scoring_system epss
scoring_elements 0.84758
published_at 2026-04-12T12:55:00Z
4
value 0.02306
scoring_system epss
scoring_elements 0.84693
published_at 2026-04-02T12:55:00Z
5
value 0.02306
scoring_system epss
scoring_elements 0.84713
published_at 2026-04-04T12:55:00Z
6
value 0.02306
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-07T12:55:00Z
7
value 0.02306
scoring_system epss
scoring_elements 0.84737
published_at 2026-04-08T12:55:00Z
8
value 0.02306
scoring_system epss
scoring_elements 0.84744
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7212
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1222809
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1222809
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
21
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
22
reference_url http://www.debian.org/security/2016/dsa-3432
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3432
23
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-139.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-139.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
25
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
26
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
27
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
28
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
29
reference_url http://www.ubuntu.com/usn/USN-2859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2859-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291587
reference_id 1291587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291587
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7212
reference_id CVE-2015-7212
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7212
47
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-139
reference_id mfsa2015-139
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-139
49
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
50
reference_url https://access.redhat.com/errata/RHSA-2016:0001
reference_id RHSA-2016:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0001
51
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
52
reference_url https://usn.ubuntu.com/2859-1/
reference_id USN-2859-1
reference_type
scores
url https://usn.ubuntu.com/2859-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7212
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ug8-hyz3-1uam
10
url VCID-55jd-xx14-d3h3
vulnerability_id VCID-55jd-xx14-d3h3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0802
reference_id
reference_type
scores
0
value 0.80386
scoring_system epss
scoring_elements 0.99118
published_at 2026-04-04T12:55:00Z
1
value 0.80386
scoring_system epss
scoring_elements 0.99115
published_at 2026-04-01T12:55:00Z
2
value 0.80386
scoring_system epss
scoring_elements 0.99116
published_at 2026-04-02T12:55:00Z
3
value 0.80386
scoring_system epss
scoring_elements 0.99124
published_at 2026-04-13T12:55:00Z
4
value 0.80386
scoring_system epss
scoring_elements 0.99122
published_at 2026-04-07T12:55:00Z
5
value 0.80386
scoring_system epss
scoring_elements 0.99123
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0802
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207086
reference_id 1207086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802
reference_id CVE-2015-0802
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb
reference_id CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-42
reference_id mfsa2015-42
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-42
7
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0802
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3
11
url VCID-5ssj-d94q-yfby
vulnerability_id VCID-5ssj-d94q-yfby
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2726.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2726
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.7934
published_at 2026-04-13T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79291
published_at 2026-04-01T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.79297
published_at 2026-04-02T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79321
published_at 2026-04-04T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.79307
published_at 2026-04-07T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-08T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.79342
published_at 2026-04-09T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79366
published_at 2026-04-11T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.7935
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2726
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236948
reference_id 1236948
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236948
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726
reference_id CVE-2015-2726
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
reference_id mfsa2015-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
6
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
7
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2726
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ssj-d94q-yfby
12
url VCID-5yzn-d698-afc1
vulnerability_id VCID-5yzn-d698-afc1
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7220.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7220.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7220
reference_id
reference_type
scores
0
value 0.01483
scoring_system epss
scoring_elements 0.81007
published_at 2026-04-13T12:55:00Z
1
value 0.01483
scoring_system epss
scoring_elements 0.80946
published_at 2026-04-01T12:55:00Z
2
value 0.01483
scoring_system epss
scoring_elements 0.81028
published_at 2026-04-11T12:55:00Z
3
value 0.01483
scoring_system epss
scoring_elements 0.81015
published_at 2026-04-12T12:55:00Z
4
value 0.01483
scoring_system epss
scoring_elements 0.80955
published_at 2026-04-02T12:55:00Z
5
value 0.01483
scoring_system epss
scoring_elements 0.80978
published_at 2026-04-04T12:55:00Z
6
value 0.01483
scoring_system epss
scoring_elements 0.80976
published_at 2026-04-07T12:55:00Z
7
value 0.01483
scoring_system epss
scoring_elements 0.81005
published_at 2026-04-08T12:55:00Z
8
value 0.01483
scoring_system epss
scoring_elements 0.81012
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7220
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1178033
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1178033
8
reference_url https://hg.mozilla.org/mozilla-central/rev/e4b9e72f934f
reference_id
reference_type
scores
url https://hg.mozilla.org/mozilla-central/rev/e4b9e72f934f
9
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-144.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-144.html
10
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
11
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
12
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291593
reference_id 1291593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291593
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7220
reference_id CVE-2015-7220
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7220
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7220
reference_id CVE-2015-7220
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7220
22
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-144
reference_id mfsa2015-144
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-144
24
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7220
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5yzn-d698-afc1
13
url VCID-6f4h-mcwj-nkd6
vulnerability_id VCID-6f4h-mcwj-nkd6
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7201.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7201.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7201
reference_id
reference_type
scores
0
value 0.01575
scoring_system epss
scoring_elements 0.81543
published_at 2026-04-13T12:55:00Z
1
value 0.01575
scoring_system epss
scoring_elements 0.81479
published_at 2026-04-01T12:55:00Z
2
value 0.01575
scoring_system epss
scoring_elements 0.81562
published_at 2026-04-11T12:55:00Z
3
value 0.01575
scoring_system epss
scoring_elements 0.8155
published_at 2026-04-12T12:55:00Z
4
value 0.01575
scoring_system epss
scoring_elements 0.8149
published_at 2026-04-02T12:55:00Z
5
value 0.01575
scoring_system epss
scoring_elements 0.81512
published_at 2026-04-04T12:55:00Z
6
value 0.01575
scoring_system epss
scoring_elements 0.81509
published_at 2026-04-07T12:55:00Z
7
value 0.01575
scoring_system epss
scoring_elements 0.81537
published_at 2026-04-08T12:55:00Z
8
value 0.01575
scoring_system epss
scoring_elements 0.81542
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7201
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1203135
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1203135
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1224100
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1224100
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1225250
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1225250
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
23
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
24
reference_url http://www.debian.org/security/2016/dsa-3432
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3432
25
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-134.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-134.html
26
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
27
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
28
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
29
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
30
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
31
reference_url http://www.ubuntu.com/usn/USN-2859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2859-1
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291571
reference_id 1291571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291571
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7201
reference_id CVE-2015-7201
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7201
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-134
reference_id mfsa2015-134
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-134
51
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
52
reference_url https://access.redhat.com/errata/RHSA-2016:0001
reference_id RHSA-2016:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0001
53
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
54
reference_url https://usn.ubuntu.com/2859-1/
reference_id USN-2859-1
reference_type
scores
url https://usn.ubuntu.com/2859-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7201
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6f4h-mcwj-nkd6
14
url VCID-75hu-brg5-cqh1
vulnerability_id VCID-75hu-brg5-cqh1
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7196.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7196.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7196
reference_id
reference_type
scores
0
value 0.02443
scoring_system epss
scoring_elements 0.85182
published_at 2026-04-13T12:55:00Z
1
value 0.02443
scoring_system epss
scoring_elements 0.8511
published_at 2026-04-01T12:55:00Z
2
value 0.02443
scoring_system epss
scoring_elements 0.85187
published_at 2026-04-11T12:55:00Z
3
value 0.02443
scoring_system epss
scoring_elements 0.85185
published_at 2026-04-12T12:55:00Z
4
value 0.02443
scoring_system epss
scoring_elements 0.85122
published_at 2026-04-02T12:55:00Z
5
value 0.02443
scoring_system epss
scoring_elements 0.8514
published_at 2026-04-04T12:55:00Z
6
value 0.02443
scoring_system epss
scoring_elements 0.85143
published_at 2026-04-07T12:55:00Z
7
value 0.02443
scoring_system epss
scoring_elements 0.85165
published_at 2026-04-08T12:55:00Z
8
value 0.02443
scoring_system epss
scoring_elements 0.85173
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7196
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1140616
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1140616
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
24
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
25
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-130.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-130.html
26
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
27
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
28
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
29
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
30
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
31
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277349
reference_id 1277349
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277349
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7196
reference_id CVE-2015-7196
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7196
42
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
43
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-130
reference_id mfsa2015-130
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-130
44
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
45
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7196
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75hu-brg5-cqh1
15
url VCID-7gzd-vyba-bfbs
vulnerability_id VCID-7gzd-vyba-bfbs
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0799
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29075
published_at 2026-04-13T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29125
published_at 2026-04-01T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.292
published_at 2026-04-02T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29252
published_at 2026-04-04T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29063
published_at 2026-04-07T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29126
published_at 2026-04-08T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29168
published_at 2026-04-09T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29173
published_at 2026-04-11T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29127
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0799
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1208731
reference_id 1208731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1208731
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799
reference_id CVE-2015-0799
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-44
reference_id mfsa2015-44
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-44
6
reference_url https://usn.ubuntu.com/2557-1/
reference_id USN-2557-1
reference_type
scores
url https://usn.ubuntu.com/2557-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0799
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gzd-vyba-bfbs
16
url VCID-7x32-gd81-r7hb
vulnerability_id VCID-7x32-gd81-r7hb
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7199.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7199.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7199
reference_id
reference_type
scores
0
value 0.0253
scoring_system epss
scoring_elements 0.85438
published_at 2026-04-13T12:55:00Z
1
value 0.0253
scoring_system epss
scoring_elements 0.85364
published_at 2026-04-01T12:55:00Z
2
value 0.0253
scoring_system epss
scoring_elements 0.85443
published_at 2026-04-11T12:55:00Z
3
value 0.0253
scoring_system epss
scoring_elements 0.85441
published_at 2026-04-12T12:55:00Z
4
value 0.0253
scoring_system epss
scoring_elements 0.85377
published_at 2026-04-02T12:55:00Z
5
value 0.0253
scoring_system epss
scoring_elements 0.85396
published_at 2026-04-04T12:55:00Z
6
value 0.0253
scoring_system epss
scoring_elements 0.85399
published_at 2026-04-07T12:55:00Z
7
value 0.0253
scoring_system epss
scoring_elements 0.8542
published_at 2026-04-08T12:55:00Z
8
value 0.0253
scoring_system epss
scoring_elements 0.85429
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7199
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1204061
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1204061
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
29
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
30
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
31
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
34
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
35
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
36
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
37
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277350
reference_id 1277350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277350
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7199
reference_id CVE-2015-7199
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7199
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-131
reference_id mfsa2015-131
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-131
51
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
52
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
53
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
54
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7199
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7x32-gd81-r7hb
17
url VCID-7yp8-9btm-zqgn
vulnerability_id VCID-7yp8-9btm-zqgn
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2743
reference_id
reference_type
scores
0
value 0.01074
scoring_system epss
scoring_elements 0.7777
published_at 2026-04-13T12:55:00Z
1
value 0.01074
scoring_system epss
scoring_elements 0.7771
published_at 2026-04-01T12:55:00Z
2
value 0.01074
scoring_system epss
scoring_elements 0.77717
published_at 2026-04-02T12:55:00Z
3
value 0.01074
scoring_system epss
scoring_elements 0.77744
published_at 2026-04-04T12:55:00Z
4
value 0.01074
scoring_system epss
scoring_elements 0.77727
published_at 2026-04-07T12:55:00Z
5
value 0.01074
scoring_system epss
scoring_elements 0.77755
published_at 2026-04-08T12:55:00Z
6
value 0.01074
scoring_system epss
scoring_elements 0.7776
published_at 2026-04-09T12:55:00Z
7
value 0.01074
scoring_system epss
scoring_elements 0.77786
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236964
reference_id 1236964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236964
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-69
reference_id mfsa2015-69
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-69
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
20
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp8-9btm-zqgn
18
url VCID-82k6-qk5e-cuag
vulnerability_id VCID-82k6-qk5e-cuag
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2729
reference_id
reference_type
scores
0
value 0.00413
scoring_system epss
scoring_elements 0.61527
published_at 2026-04-13T12:55:00Z
1
value 0.00413
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-01T12:55:00Z
2
value 0.00413
scoring_system epss
scoring_elements 0.61478
published_at 2026-04-02T12:55:00Z
3
value 0.00413
scoring_system epss
scoring_elements 0.61507
published_at 2026-04-04T12:55:00Z
4
value 0.00413
scoring_system epss
scoring_elements 0.61477
published_at 2026-04-07T12:55:00Z
5
value 0.00413
scoring_system epss
scoring_elements 0.61524
published_at 2026-04-08T12:55:00Z
6
value 0.00413
scoring_system epss
scoring_elements 0.61539
published_at 2026-04-09T12:55:00Z
7
value 0.00413
scoring_system epss
scoring_elements 0.61561
published_at 2026-04-11T12:55:00Z
8
value 0.00413
scoring_system epss
scoring_elements 0.61548
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2729
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236952
reference_id 1236952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236952
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729
reference_id CVE-2015-2729
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-62
reference_id mfsa2015-62
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-62
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2729
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag
19
url VCID-86e3-nbmx-xkfb
vulnerability_id VCID-86e3-nbmx-xkfb
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7195.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7195
reference_id
reference_type
scores
0
value 0.00563
scoring_system epss
scoring_elements 0.68374
published_at 2026-04-13T12:55:00Z
1
value 0.00563
scoring_system epss
scoring_elements 0.68309
published_at 2026-04-01T12:55:00Z
2
value 0.00563
scoring_system epss
scoring_elements 0.6842
published_at 2026-04-11T12:55:00Z
3
value 0.00563
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-12T12:55:00Z
4
value 0.00563
scoring_system epss
scoring_elements 0.68329
published_at 2026-04-02T12:55:00Z
5
value 0.00563
scoring_system epss
scoring_elements 0.68348
published_at 2026-04-04T12:55:00Z
6
value 0.00563
scoring_system epss
scoring_elements 0.68325
published_at 2026-04-07T12:55:00Z
7
value 0.00563
scoring_system epss
scoring_elements 0.68376
published_at 2026-04-08T12:55:00Z
8
value 0.00563
scoring_system epss
scoring_elements 0.68393
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7195
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1211871
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1211871
4
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-129.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-129.html
5
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
6
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
7
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277348
reference_id 1277348
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277348
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195
reference_id CVE-2015-7195
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7195
reference_id CVE-2015-7195
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7195
12
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-129
reference_id mfsa2015-129
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-129
14
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7195
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86e3-nbmx-xkfb
20
url VCID-8k6u-3apv-wye1
vulnerability_id VCID-8k6u-3apv-wye1
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7219.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7219.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7219
reference_id
reference_type
scores
0
value 0.01259
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-13T12:55:00Z
1
value 0.01259
scoring_system epss
scoring_elements 0.79352
published_at 2026-04-01T12:55:00Z
2
value 0.01259
scoring_system epss
scoring_elements 0.79426
published_at 2026-04-11T12:55:00Z
3
value 0.01259
scoring_system epss
scoring_elements 0.7941
published_at 2026-04-12T12:55:00Z
4
value 0.01259
scoring_system epss
scoring_elements 0.79359
published_at 2026-04-02T12:55:00Z
5
value 0.01259
scoring_system epss
scoring_elements 0.79381
published_at 2026-04-04T12:55:00Z
6
value 0.01259
scoring_system epss
scoring_elements 0.79367
published_at 2026-04-07T12:55:00Z
7
value 0.01259
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-08T12:55:00Z
8
value 0.01259
scoring_system epss
scoring_elements 0.79403
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7219
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194820
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194820
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-142.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-142.html
9
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291590
reference_id 1291590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291590
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7219
reference_id CVE-2015-7219
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7219
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7219
reference_id CVE-2015-7219
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7219
21
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-142
reference_id mfsa2015-142
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-142
23
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7219
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k6u-3apv-wye1
21
url VCID-9gpb-1jc2-f7f5
vulnerability_id VCID-9gpb-1jc2-f7f5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0798
reference_id
reference_type
scores
0
value 0.01465
scoring_system epss
scoring_elements 0.80883
published_at 2026-04-13T12:55:00Z
1
value 0.01465
scoring_system epss
scoring_elements 0.80826
published_at 2026-04-01T12:55:00Z
2
value 0.01465
scoring_system epss
scoring_elements 0.80835
published_at 2026-04-02T12:55:00Z
3
value 0.01465
scoring_system epss
scoring_elements 0.80856
published_at 2026-04-04T12:55:00Z
4
value 0.01465
scoring_system epss
scoring_elements 0.80853
published_at 2026-04-07T12:55:00Z
5
value 0.01465
scoring_system epss
scoring_elements 0.80881
published_at 2026-04-08T12:55:00Z
6
value 0.01465
scoring_system epss
scoring_elements 0.80889
published_at 2026-04-09T12:55:00Z
7
value 0.01465
scoring_system epss
scoring_elements 0.80905
published_at 2026-04-11T12:55:00Z
8
value 0.01465
scoring_system epss
scoring_elements 0.80891
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0798
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0798
reference_id CVE-2015-0798
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0798
2
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-43
reference_id mfsa2015-43
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-43
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0798
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9gpb-1jc2-f7f5
22
url VCID-9n5g-6m3r-3uez
vulnerability_id VCID-9n5g-6m3r-3uez
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0808
reference_id
reference_type
scores
0
value 0.00705
scoring_system epss
scoring_elements 0.72096
published_at 2026-04-13T12:55:00Z
1
value 0.00705
scoring_system epss
scoring_elements 0.72051
published_at 2026-04-01T12:55:00Z
2
value 0.00705
scoring_system epss
scoring_elements 0.72058
published_at 2026-04-02T12:55:00Z
3
value 0.00705
scoring_system epss
scoring_elements 0.72078
published_at 2026-04-04T12:55:00Z
4
value 0.00705
scoring_system epss
scoring_elements 0.72054
published_at 2026-04-07T12:55:00Z
5
value 0.00705
scoring_system epss
scoring_elements 0.72092
published_at 2026-04-08T12:55:00Z
6
value 0.00705
scoring_system epss
scoring_elements 0.72103
published_at 2026-04-09T12:55:00Z
7
value 0.00705
scoring_system epss
scoring_elements 0.72126
published_at 2026-04-11T12:55:00Z
8
value 0.00705
scoring_system epss
scoring_elements 0.72111
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0808
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207075
reference_id 1207075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207075
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808
reference_id CVE-2015-0808
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-36
reference_id mfsa2015-36
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-36
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0808
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5g-6m3r-3uez
23
url VCID-9yag-27hn-skgx
vulnerability_id VCID-9yag-27hn-skgx
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7200.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7200.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7200
reference_id
reference_type
scores
0
value 0.02289
scoring_system epss
scoring_elements 0.84705
published_at 2026-04-13T12:55:00Z
1
value 0.02289
scoring_system epss
scoring_elements 0.84632
published_at 2026-04-01T12:55:00Z
2
value 0.02289
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-11T12:55:00Z
3
value 0.02289
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-12T12:55:00Z
4
value 0.02289
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-02T12:55:00Z
5
value 0.02289
scoring_system epss
scoring_elements 0.84666
published_at 2026-04-04T12:55:00Z
6
value 0.02289
scoring_system epss
scoring_elements 0.84668
published_at 2026-04-07T12:55:00Z
7
value 0.02289
scoring_system epss
scoring_elements 0.8469
published_at 2026-04-08T12:55:00Z
8
value 0.02289
scoring_system epss
scoring_elements 0.84697
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7200
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1204155
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1204155
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
29
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
30
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
31
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-131.html
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
34
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
35
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
36
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
37
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277350
reference_id 1277350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277350
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7200
reference_id CVE-2015-7200
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7200
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-131
reference_id mfsa2015-131
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-131
51
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
52
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
53
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
54
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7200
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yag-27hn-skgx
24
url VCID-a2fb-cz2r-kudj
vulnerability_id VCID-a2fb-cz2r-kudj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7202.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7202.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7202
reference_id
reference_type
scores
0
value 0.01913
scoring_system epss
scoring_elements 0.83301
published_at 2026-04-13T12:55:00Z
1
value 0.01913
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-01T12:55:00Z
2
value 0.01913
scoring_system epss
scoring_elements 0.83311
published_at 2026-04-11T12:55:00Z
3
value 0.01913
scoring_system epss
scoring_elements 0.83305
published_at 2026-04-12T12:55:00Z
4
value 0.01913
scoring_system epss
scoring_elements 0.83248
published_at 2026-04-02T12:55:00Z
5
value 0.01913
scoring_system epss
scoring_elements 0.83263
published_at 2026-04-04T12:55:00Z
6
value 0.01913
scoring_system epss
scoring_elements 0.83262
published_at 2026-04-07T12:55:00Z
7
value 0.01913
scoring_system epss
scoring_elements 0.83286
published_at 2026-04-08T12:55:00Z
8
value 0.01913
scoring_system epss
scoring_elements 0.83296
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7202
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1188105
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1188105
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1193757
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1193757
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1193999
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1193999
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194002
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194002
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194006
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194006
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1197012
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1197012
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1200580
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1200580
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1207571
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1207571
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1208059
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1208059
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1212305
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1212305
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1219330
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1219330
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221421
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221421
22
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221904
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221904
23
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-134.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-134.html
24
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
25
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
26
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291577
reference_id 1291577
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291577
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202
reference_id CVE-2015-7202
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7202
reference_id CVE-2015-7202
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7202
36
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-134
reference_id mfsa2015-134
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-134
38
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7202
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2fb-cz2r-kudj
25
url VCID-assf-1bj2-pyb6
vulnerability_id VCID-assf-1bj2-pyb6
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4514.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4514.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4514
reference_id
reference_type
scores
0
value 0.0185
scoring_system epss
scoring_elements 0.82995
published_at 2026-04-13T12:55:00Z
1
value 0.0185
scoring_system epss
scoring_elements 0.82931
published_at 2026-04-01T12:55:00Z
2
value 0.0185
scoring_system epss
scoring_elements 0.83005
published_at 2026-04-11T12:55:00Z
3
value 0.0185
scoring_system epss
scoring_elements 0.82999
published_at 2026-04-12T12:55:00Z
4
value 0.0185
scoring_system epss
scoring_elements 0.82947
published_at 2026-04-02T12:55:00Z
5
value 0.0185
scoring_system epss
scoring_elements 0.8296
published_at 2026-04-04T12:55:00Z
6
value 0.0185
scoring_system epss
scoring_elements 0.82957
published_at 2026-04-07T12:55:00Z
7
value 0.0185
scoring_system epss
scoring_elements 0.82982
published_at 2026-04-08T12:55:00Z
8
value 0.0185
scoring_system epss
scoring_elements 0.82989
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4514
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1185157
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1185157
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1186160
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1186160
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1196237
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1196237
8
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1200326
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1200326
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1202677
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1202677
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1205937
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1205937
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=969309
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=969309
12
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
13
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
14
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
15
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
16
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277334
reference_id 1277334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277334
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514
reference_id CVE-2015-4514
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4514
reference_id CVE-2015-4514
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4514
29
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-116
reference_id mfsa2015-116
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-116
31
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-4514
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-assf-1bj2-pyb6
26
url VCID-bdjz-rqmx-83gz
vulnerability_id VCID-bdjz-rqmx-83gz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2808
reference_id
reference_type
scores
0
value 0.30832
scoring_system epss
scoring_elements 0.96729
published_at 2026-04-13T12:55:00Z
1
value 0.30832
scoring_system epss
scoring_elements 0.96723
published_at 2026-04-08T12:55:00Z
2
value 0.30832
scoring_system epss
scoring_elements 0.96724
published_at 2026-04-09T12:55:00Z
3
value 0.30832
scoring_system epss
scoring_elements 0.96726
published_at 2026-04-12T12:55:00Z
4
value 0.36986
scoring_system epss
scoring_elements 0.9714
published_at 2026-04-07T12:55:00Z
5
value 0.36986
scoring_system epss
scoring_elements 0.97133
published_at 2026-04-02T12:55:00Z
6
value 0.36986
scoring_system epss
scoring_elements 0.97139
published_at 2026-04-04T12:55:00Z
7
value 0.36986
scoring_system epss
scoring_elements 0.97126
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
25
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207101
reference_id 1207101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207101
27
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
28
reference_url https://access.redhat.com/errata/RHSA-2015:1006
reference_id RHSA-2015:1006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1006
29
reference_url https://access.redhat.com/errata/RHSA-2015:1007
reference_id RHSA-2015:1007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1007
30
reference_url https://access.redhat.com/errata/RHSA-2015:1020
reference_id RHSA-2015:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1020
31
reference_url https://access.redhat.com/errata/RHSA-2015:1021
reference_id RHSA-2015:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1021
32
reference_url https://access.redhat.com/errata/RHSA-2015:1091
reference_id RHSA-2015:1091
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1091
33
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
34
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
35
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
36
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
37
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
38
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
39
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
40
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
41
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2808
risk_score 0.7
exploitability 0.5
weighted_severity 1.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdjz-rqmx-83gz
27
url VCID-d9m7-a3y7-uqaa
vulnerability_id VCID-d9m7-a3y7-uqaa
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7215.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7215.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7215
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63085
published_at 2026-04-13T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.62986
published_at 2026-04-01T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-11T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63108
published_at 2026-04-12T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63044
published_at 2026-04-02T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63073
published_at 2026-04-04T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63037
published_at 2026-04-07T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63088
published_at 2026-04-08T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7215
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1160890
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1160890
8
reference_url https://github.com/whatwg/html/issues/164
reference_id
reference_type
scores
url https://github.com/whatwg/html/issues/164
9
reference_url https://github.com/whatwg/html/pull/166
reference_id
reference_type
scores
url https://github.com/whatwg/html/pull/166
10
reference_url https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961
reference_id
reference_type
scores
url https://www.w3.org/Bugs/Public/show_bug.cgi?id=28961
11
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-140.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-140.html
12
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
13
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
14
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291588
reference_id 1291588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291588
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7215
reference_id CVE-2015-7215
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7215
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7215
reference_id CVE-2015-7215
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7215
24
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-140
reference_id mfsa2015-140
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-140
26
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7215
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9m7-a3y7-uqaa
28
url VCID-ducs-kg2t-7kdp
vulnerability_id VCID-ducs-kg2t-7kdp
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7189.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7189.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7189
reference_id
reference_type
scores
0
value 0.03549
scoring_system epss
scoring_elements 0.87691
published_at 2026-04-13T12:55:00Z
1
value 0.03549
scoring_system epss
scoring_elements 0.87636
published_at 2026-04-01T12:55:00Z
2
value 0.03549
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-11T12:55:00Z
3
value 0.03549
scoring_system epss
scoring_elements 0.87693
published_at 2026-04-12T12:55:00Z
4
value 0.03549
scoring_system epss
scoring_elements 0.87646
published_at 2026-04-02T12:55:00Z
5
value 0.03549
scoring_system epss
scoring_elements 0.87659
published_at 2026-04-04T12:55:00Z
6
value 0.03549
scoring_system epss
scoring_elements 0.8766
published_at 2026-04-07T12:55:00Z
7
value 0.03549
scoring_system epss
scoring_elements 0.87681
published_at 2026-04-08T12:55:00Z
8
value 0.03549
scoring_system epss
scoring_elements 0.87687
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7189
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1205900
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1205900
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
29
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
30
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
31
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-123.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-123.html
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
34
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
35
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
36
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
37
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277344
reference_id 1277344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277344
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7189
reference_id CVE-2015-7189
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7189
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-123
reference_id mfsa2015-123
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-123
51
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
52
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
53
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
54
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7189
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ducs-kg2t-7kdp
29
url VCID-e193-1kgh-5kda
vulnerability_id VCID-e193-1kgh-5kda
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0805
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0805
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
reference_id 1207078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207078
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805
reference_id CVE-2015-0805
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
reference_id mfsa2015-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-38
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0805
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda
30
url VCID-f11x-jaxy-5ybr
vulnerability_id VCID-f11x-jaxy-5ybr
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00089.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00091.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7207.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7207.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7207
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63085
published_at 2026-04-13T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.62986
published_at 2026-04-01T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-11T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63108
published_at 2026-04-12T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63044
published_at 2026-04-02T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63073
published_at 2026-04-04T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63037
published_at 2026-04-07T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63088
published_at 2026-04-08T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63104
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7207
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1185256
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1185256
10
reference_url https://github.com/w3c/resource-timing/issues/29
reference_id
reference_type
scores
url https://github.com/w3c/resource-timing/issues/29
11
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-136.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-136.html
12
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
13
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
14
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291581
reference_id 1291581
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291581
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7207
reference_id CVE-2015-7207
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7207
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7207
reference_id CVE-2015-7207
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7207
24
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-136
reference_id mfsa2015-136
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-136
26
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7207
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f11x-jaxy-5ybr
31
url VCID-f677-m1p3-nqdq
vulnerability_id VCID-f677-m1p3-nqdq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2737.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2737
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.79343
published_at 2026-04-13T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79293
published_at 2026-04-01T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.793
published_at 2026-04-02T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79324
published_at 2026-04-04T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.7931
published_at 2026-04-07T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-08T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.79345
published_at 2026-04-09T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79369
published_at 2026-04-11T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2737
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f677-m1p3-nqdq
32
url VCID-fasa-11uc-jucq
vulnerability_id VCID-fasa-11uc-jucq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4495
reference_id
reference_type
scores
0
value 0.71568
scoring_system epss
scoring_elements 0.98719
published_at 2026-04-02T12:55:00Z
1
value 0.71568
scoring_system epss
scoring_elements 0.9873
published_at 2026-04-12T12:55:00Z
2
value 0.71568
scoring_system epss
scoring_elements 0.98718
published_at 2026-04-01T12:55:00Z
3
value 0.71568
scoring_system epss
scoring_elements 0.98727
published_at 2026-04-09T12:55:00Z
4
value 0.71568
scoring_system epss
scoring_elements 0.98723
published_at 2026-04-04T12:55:00Z
5
value 0.71568
scoring_system epss
scoring_elements 0.98731
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4495
2
reference_url http://www.securitytracker.com/id/1033216
reference_id 1033216
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.securitytracker.com/id/1033216
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1251318
reference_id 1251318
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1251318
4
reference_url https://www.exploit-db.com/exploits/37772/
reference_id 37772
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://www.exploit-db.com/exploits/37772/
5
reference_url http://www.securityfocus.com/bid/76249
reference_id 76249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.securityfocus.com/bid/76249
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495
reference_id CVE-2015-4495
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js
reference_id CVE-2015-4495;OSVDB-125839
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/37772.js
8
reference_url https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
reference_id firefox-exploit-found-in-the-wild
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
9
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://security.gentoo.org/glsa/201512-10
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-78
reference_id mfsa2015-78
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-78
11
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-78.html
reference_id mfsa2015-78.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.mozilla.org/security/announce/2015/mfsa2015-78.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00009.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00010.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html
15
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00016.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
reference_id msg00021.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00021.html
18
reference_url https://access.redhat.com/errata/RHSA-2015:1581
reference_id RHSA-2015:1581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1581
19
reference_url http://rhn.redhat.com/errata/RHSA-2015-1581.html
reference_id RHSA-2015-1581.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://rhn.redhat.com/errata/RHSA-2015-1581.html
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1178058
reference_id show_bug.cgi?id=1178058
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1178058
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1179262
reference_id show_bug.cgi?id=1179262
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1179262
22
reference_url https://usn.ubuntu.com/2707-1/
reference_id USN-2707-1
reference_type
scores
url https://usn.ubuntu.com/2707-1/
23
reference_url http://www.ubuntu.com/usn/USN-2707-1
reference_id USN-2707-1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:50:43Z/
url http://www.ubuntu.com/usn/USN-2707-1
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-4495
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fasa-11uc-jucq
33
url VCID-ffrc-3bx6-jbav
vulnerability_id VCID-ffrc-3bx6-jbav
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0801
reference_id
reference_type
scores
0
value 0.01191
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-13T12:55:00Z
1
value 0.01191
scoring_system epss
scoring_elements 0.78795
published_at 2026-04-01T12:55:00Z
2
value 0.01191
scoring_system epss
scoring_elements 0.78802
published_at 2026-04-02T12:55:00Z
3
value 0.01191
scoring_system epss
scoring_elements 0.78832
published_at 2026-04-04T12:55:00Z
4
value 0.01191
scoring_system epss
scoring_elements 0.78815
published_at 2026-04-07T12:55:00Z
5
value 0.01191
scoring_system epss
scoring_elements 0.7884
published_at 2026-04-08T12:55:00Z
6
value 0.01191
scoring_system epss
scoring_elements 0.78846
published_at 2026-04-09T12:55:00Z
7
value 0.01191
scoring_system epss
scoring_elements 0.7887
published_at 2026-04-11T12:55:00Z
8
value 0.01191
scoring_system epss
scoring_elements 0.78853
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207084
reference_id 1207084
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207084
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-40
reference_id mfsa2015-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-40
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0801
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav
34
url VCID-fubs-3mtf-77c7
vulnerability_id VCID-fubs-3mtf-77c7
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2739
reference_id
reference_type
scores
0
value 0.01051
scoring_system epss
scoring_elements 0.77551
published_at 2026-04-13T12:55:00Z
1
value 0.01051
scoring_system epss
scoring_elements 0.77492
published_at 2026-04-01T12:55:00Z
2
value 0.01051
scoring_system epss
scoring_elements 0.77498
published_at 2026-04-02T12:55:00Z
3
value 0.01051
scoring_system epss
scoring_elements 0.77523
published_at 2026-04-04T12:55:00Z
4
value 0.01051
scoring_system epss
scoring_elements 0.77503
published_at 2026-04-07T12:55:00Z
5
value 0.01051
scoring_system epss
scoring_elements 0.77533
published_at 2026-04-08T12:55:00Z
6
value 0.01051
scoring_system epss
scoring_elements 0.77542
published_at 2026-04-09T12:55:00Z
7
value 0.01051
scoring_system epss
scoring_elements 0.77568
published_at 2026-04-11T12:55:00Z
8
value 0.01051
scoring_system epss
scoring_elements 0.77553
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2739
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fubs-3mtf-77c7
35
url VCID-g6zq-mufw-h3gh
vulnerability_id VCID-g6zq-mufw-h3gh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7222.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7222.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7222
reference_id
reference_type
scores
0
value 0.03351
scoring_system epss
scoring_elements 0.87322
published_at 2026-04-13T12:55:00Z
1
value 0.03351
scoring_system epss
scoring_elements 0.87268
published_at 2026-04-01T12:55:00Z
2
value 0.03351
scoring_system epss
scoring_elements 0.87331
published_at 2026-04-11T12:55:00Z
3
value 0.03351
scoring_system epss
scoring_elements 0.87325
published_at 2026-04-12T12:55:00Z
4
value 0.03351
scoring_system epss
scoring_elements 0.87278
published_at 2026-04-02T12:55:00Z
5
value 0.03351
scoring_system epss
scoring_elements 0.87295
published_at 2026-04-04T12:55:00Z
6
value 0.03351
scoring_system epss
scoring_elements 0.87293
published_at 2026-04-07T12:55:00Z
7
value 0.03351
scoring_system epss
scoring_elements 0.87312
published_at 2026-04-08T12:55:00Z
8
value 0.03351
scoring_system epss
scoring_elements 0.87319
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7222
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1216748
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1216748
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
21
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
22
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-147.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-147.html
23
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
24
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
25
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
26
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291597
reference_id 1291597
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291597
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7222
reference_id CVE-2015-7222
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7222
44
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
45
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-147
reference_id mfsa2015-147
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-147
46
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
47
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7222
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6zq-mufw-h3gh
36
url VCID-gr7k-2v4p-kbfg
vulnerability_id VCID-gr7k-2v4p-kbfg
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0816
reference_id
reference_type
scores
0
value 0.8537
scoring_system epss
scoring_elements 0.99363
published_at 2026-04-08T12:55:00Z
1
value 0.8537
scoring_system epss
scoring_elements 0.99359
published_at 2026-04-02T12:55:00Z
2
value 0.8537
scoring_system epss
scoring_elements 0.99361
published_at 2026-04-04T12:55:00Z
3
value 0.8537
scoring_system epss
scoring_elements 0.99366
published_at 2026-04-13T12:55:00Z
4
value 0.8537
scoring_system epss
scoring_elements 0.99364
published_at 2026-04-09T12:55:00Z
5
value 0.8537
scoring_system epss
scoring_elements 0.99365
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207072
reference_id 1207072
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207072
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-33
reference_id mfsa2015-33
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-33
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0816
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg
37
url VCID-grdt-g3kf-3uh3
vulnerability_id VCID-grdt-g3kf-3uh3
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0815
reference_id
reference_type
scores
0
value 0.01254
scoring_system epss
scoring_elements 0.79362
published_at 2026-04-13T12:55:00Z
1
value 0.01254
scoring_system epss
scoring_elements 0.79314
published_at 2026-04-01T12:55:00Z
2
value 0.01254
scoring_system epss
scoring_elements 0.79321
published_at 2026-04-02T12:55:00Z
3
value 0.01254
scoring_system epss
scoring_elements 0.79344
published_at 2026-04-04T12:55:00Z
4
value 0.01254
scoring_system epss
scoring_elements 0.7933
published_at 2026-04-07T12:55:00Z
5
value 0.01254
scoring_system epss
scoring_elements 0.79356
published_at 2026-04-08T12:55:00Z
6
value 0.01254
scoring_system epss
scoring_elements 0.79365
published_at 2026-04-09T12:55:00Z
7
value 0.01254
scoring_system epss
scoring_elements 0.79389
published_at 2026-04-11T12:55:00Z
8
value 0.01254
scoring_system epss
scoring_elements 0.79373
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207068
reference_id 1207068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207068
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
reference_id mfsa2015-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-30
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0815
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3
38
url VCID-gwtj-tnhj-wfev
vulnerability_id VCID-gwtj-tnhj-wfev
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2725.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2725
reference_id
reference_type
scores
0
value 0.01627
scoring_system epss
scoring_elements 0.81868
published_at 2026-04-13T12:55:00Z
1
value 0.01627
scoring_system epss
scoring_elements 0.81803
published_at 2026-04-01T12:55:00Z
2
value 0.01627
scoring_system epss
scoring_elements 0.81813
published_at 2026-04-02T12:55:00Z
3
value 0.01627
scoring_system epss
scoring_elements 0.81836
published_at 2026-04-04T12:55:00Z
4
value 0.01627
scoring_system epss
scoring_elements 0.81833
published_at 2026-04-07T12:55:00Z
5
value 0.01627
scoring_system epss
scoring_elements 0.8186
published_at 2026-04-08T12:55:00Z
6
value 0.01627
scoring_system epss
scoring_elements 0.81867
published_at 2026-04-09T12:55:00Z
7
value 0.01627
scoring_system epss
scoring_elements 0.81885
published_at 2026-04-11T12:55:00Z
8
value 0.01627
scoring_system epss
scoring_elements 0.81873
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2725
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
reference_id 1236947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725
reference_id CVE-2015-2725
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
reference_id mfsa2015-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
8
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
9
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2725
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwtj-tnhj-wfev
39
url VCID-h1my-ggw9-zuft
vulnerability_id VCID-h1my-ggw9-zuft
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7223.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7223.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7223
reference_id
reference_type
scores
0
value 0.00744
scoring_system epss
scoring_elements 0.73022
published_at 2026-04-13T12:55:00Z
1
value 0.00744
scoring_system epss
scoring_elements 0.72965
published_at 2026-04-01T12:55:00Z
2
value 0.00744
scoring_system epss
scoring_elements 0.7305
published_at 2026-04-11T12:55:00Z
3
value 0.00744
scoring_system epss
scoring_elements 0.73029
published_at 2026-04-12T12:55:00Z
4
value 0.00744
scoring_system epss
scoring_elements 0.72978
published_at 2026-04-02T12:55:00Z
5
value 0.00744
scoring_system epss
scoring_elements 0.72998
published_at 2026-04-04T12:55:00Z
6
value 0.00744
scoring_system epss
scoring_elements 0.72974
published_at 2026-04-07T12:55:00Z
7
value 0.00744
scoring_system epss
scoring_elements 0.73011
published_at 2026-04-08T12:55:00Z
8
value 0.00744
scoring_system epss
scoring_elements 0.73025
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7223
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1226423
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1226423
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-148.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-148.html
9
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291599
reference_id 1291599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291599
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7223
reference_id CVE-2015-7223
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7223
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7223
reference_id CVE-2015-7223
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7223
21
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-148
reference_id mfsa2015-148
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-148
23
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7223
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1my-ggw9-zuft
40
url VCID-h1z7-68a7-bfa8
vulnerability_id VCID-h1z7-68a7-bfa8
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4518.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4518.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4518
reference_id
reference_type
scores
0
value 0.01148
scoring_system epss
scoring_elements 0.78474
published_at 2026-04-13T12:55:00Z
1
value 0.01148
scoring_system epss
scoring_elements 0.78423
published_at 2026-04-01T12:55:00Z
2
value 0.01148
scoring_system epss
scoring_elements 0.78501
published_at 2026-04-11T12:55:00Z
3
value 0.01148
scoring_system epss
scoring_elements 0.78482
published_at 2026-04-12T12:55:00Z
4
value 0.01148
scoring_system epss
scoring_elements 0.78429
published_at 2026-04-02T12:55:00Z
5
value 0.01148
scoring_system epss
scoring_elements 0.7846
published_at 2026-04-04T12:55:00Z
6
value 0.01148
scoring_system epss
scoring_elements 0.78443
published_at 2026-04-07T12:55:00Z
7
value 0.01148
scoring_system epss
scoring_elements 0.7847
published_at 2026-04-08T12:55:00Z
8
value 0.01148
scoring_system epss
scoring_elements 0.78475
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4518
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1136692
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1136692
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1182778
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1182778
5
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-118.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-118.html
6
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
7
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
8
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277339
reference_id 1277339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277339
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518
reference_id CVE-2015-4518
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4518
reference_id CVE-2015-4518
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4518
13
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-118
reference_id mfsa2015-118
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-118
15
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-4518
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1z7-68a7-bfa8
41
url VCID-h6wt-azn4-mqfn
vulnerability_id VCID-h6wt-azn4-mqfn
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7205.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7205.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7205
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75071
published_at 2026-04-13T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75027
published_at 2026-04-01T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75103
published_at 2026-04-11T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75082
published_at 2026-04-12T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.7503
published_at 2026-04-02T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-04T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75035
published_at 2026-04-07T12:55:00Z
7
value 0.00863
scoring_system epss
scoring_elements 0.75069
published_at 2026-04-08T12:55:00Z
8
value 0.00863
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7205
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1220493
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1220493
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
21
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
22
reference_url http://www.debian.org/security/2016/dsa-3432
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3432
23
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-145.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-145.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
25
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
26
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
27
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
28
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
29
reference_url http://www.ubuntu.com/usn/USN-2859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2859-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291595
reference_id 1291595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291595
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7205
reference_id CVE-2015-7205
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7205
47
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-145
reference_id mfsa2015-145
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-145
49
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
50
reference_url https://access.redhat.com/errata/RHSA-2016:0001
reference_id RHSA-2016:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0001
51
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
52
reference_url https://usn.ubuntu.com/2859-1/
reference_id USN-2859-1
reference_type
scores
url https://usn.ubuntu.com/2859-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7205
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h6wt-azn4-mqfn
42
url VCID-h7mu-heyn-yqch
vulnerability_id VCID-h7mu-heyn-yqch
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7197.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7197.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7197
reference_id
reference_type
scores
0
value 0.01832
scoring_system epss
scoring_elements 0.82915
published_at 2026-04-13T12:55:00Z
1
value 0.01832
scoring_system epss
scoring_elements 0.82848
published_at 2026-04-01T12:55:00Z
2
value 0.01832
scoring_system epss
scoring_elements 0.82923
published_at 2026-04-11T12:55:00Z
3
value 0.01832
scoring_system epss
scoring_elements 0.82918
published_at 2026-04-12T12:55:00Z
4
value 0.01832
scoring_system epss
scoring_elements 0.82865
published_at 2026-04-02T12:55:00Z
5
value 0.01832
scoring_system epss
scoring_elements 0.82878
published_at 2026-04-04T12:55:00Z
6
value 0.01832
scoring_system epss
scoring_elements 0.82874
published_at 2026-04-07T12:55:00Z
7
value 0.01832
scoring_system epss
scoring_elements 0.82899
published_at 2026-04-08T12:55:00Z
8
value 0.01832
scoring_system epss
scoring_elements 0.82907
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7197
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1204269
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1204269
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
29
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
30
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
31
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-132.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-132.html
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
34
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
35
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
36
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
37
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277351
reference_id 1277351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277351
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7197
reference_id CVE-2015-7197
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7197
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-132
reference_id mfsa2015-132
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-132
51
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
52
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
53
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
54
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7197
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7mu-heyn-yqch
43
url VCID-h7zg-petj-hqfv
vulnerability_id VCID-h7zg-petj-hqfv
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0812.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0812
reference_id
reference_type
scores
0
value 0.00148
scoring_system epss
scoring_elements 0.35272
published_at 2026-04-13T12:55:00Z
1
value 0.00148
scoring_system epss
scoring_elements 0.35151
published_at 2026-04-01T12:55:00Z
2
value 0.00148
scoring_system epss
scoring_elements 0.35351
published_at 2026-04-02T12:55:00Z
3
value 0.00148
scoring_system epss
scoring_elements 0.35378
published_at 2026-04-04T12:55:00Z
4
value 0.00148
scoring_system epss
scoring_elements 0.3526
published_at 2026-04-07T12:55:00Z
5
value 0.00148
scoring_system epss
scoring_elements 0.35306
published_at 2026-04-08T12:55:00Z
6
value 0.00148
scoring_system epss
scoring_elements 0.3533
published_at 2026-04-09T12:55:00Z
7
value 0.00148
scoring_system epss
scoring_elements 0.35331
published_at 2026-04-11T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35295
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0812
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207071
reference_id 1207071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207071
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812
reference_id CVE-2015-0812
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-32
reference_id mfsa2015-32
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-32
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0812
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7zg-petj-hqfv
44
url VCID-hwws-vwt3-yfch
vulnerability_id VCID-hwws-vwt3-yfch
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7192
reference_id
reference_type
scores
0
value 0.02655
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-13T12:55:00Z
1
value 0.02655
scoring_system epss
scoring_elements 0.85702
published_at 2026-04-01T12:55:00Z
2
value 0.02655
scoring_system epss
scoring_elements 0.85784
published_at 2026-04-11T12:55:00Z
3
value 0.02655
scoring_system epss
scoring_elements 0.85781
published_at 2026-04-12T12:55:00Z
4
value 0.02655
scoring_system epss
scoring_elements 0.85715
published_at 2026-04-02T12:55:00Z
5
value 0.02655
scoring_system epss
scoring_elements 0.85733
published_at 2026-04-04T12:55:00Z
6
value 0.02655
scoring_system epss
scoring_elements 0.8574
published_at 2026-04-07T12:55:00Z
7
value 0.02655
scoring_system epss
scoring_elements 0.85759
published_at 2026-04-08T12:55:00Z
8
value 0.02655
scoring_system epss
scoring_elements 0.8577
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7192
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1210023
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1210023
3
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-126.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-126.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7192
reference_id CVE-2015-7192
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7192
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7192
reference_id CVE-2015-7192
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7192
10
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-126
reference_id mfsa2015-126
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-126
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7192
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwws-vwt3-yfch
45
url VCID-jmhk-12t1-kugh
vulnerability_id VCID-jmhk-12t1-kugh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45533
published_at 2026-04-13T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.4544
published_at 2026-04-01T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45514
published_at 2026-04-02T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45536
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45482
published_at 2026-04-07T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45537
published_at 2026-04-08T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45538
published_at 2026-04-09T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45558
published_at 2026-04-11T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45527
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2730
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
reference_id 1236954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236954
5
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
reference_id mfsa2015-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-64
7
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
8
reference_url https://access.redhat.com/errata/RHSA-2015:1699
reference_id RHSA-2015:1699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1699
9
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
10
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
11
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh
46
url VCID-jnj4-g593-37d7
vulnerability_id VCID-jnj4-g593-37d7
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0811
reference_id
reference_type
scores
0
value 0.00765
scoring_system epss
scoring_elements 0.73435
published_at 2026-04-13T12:55:00Z
1
value 0.00765
scoring_system epss
scoring_elements 0.73385
published_at 2026-04-01T12:55:00Z
2
value 0.00765
scoring_system epss
scoring_elements 0.73394
published_at 2026-04-02T12:55:00Z
3
value 0.00765
scoring_system epss
scoring_elements 0.73417
published_at 2026-04-04T12:55:00Z
4
value 0.00765
scoring_system epss
scoring_elements 0.73389
published_at 2026-04-07T12:55:00Z
5
value 0.00765
scoring_system epss
scoring_elements 0.73426
published_at 2026-04-08T12:55:00Z
6
value 0.00765
scoring_system epss
scoring_elements 0.7344
published_at 2026-04-09T12:55:00Z
7
value 0.00765
scoring_system epss
scoring_elements 0.73463
published_at 2026-04-11T12:55:00Z
8
value 0.00765
scoring_system epss
scoring_elements 0.73443
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0811
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207073
reference_id 1207073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207073
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811
reference_id CVE-2015-0811
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-34
reference_id mfsa2015-34
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-34
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0811
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7
47
url VCID-k1fr-d61m-b7fq
vulnerability_id VCID-k1fr-d61m-b7fq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7208.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7208.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7208
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69956
published_at 2026-04-13T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69945
published_at 2026-04-08T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.69961
published_at 2026-04-09T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69985
published_at 2026-04-11T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69969
published_at 2026-04-12T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69892
published_at 2026-04-01T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.69905
published_at 2026-04-02T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.69919
published_at 2026-04-04T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.69897
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7208
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1191423
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1191423
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-137.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-137.html
12
reference_url http://www.mozilla.org/security/announce/2016/mfsa2016-04.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2016/mfsa2016-04.html
13
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
14
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
15
reference_url http://www.securitytracker.com/id/1034825
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034825
16
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291583
reference_id 1291583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291583
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7208
reference_id CVE-2015-7208
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7208
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7208
reference_id CVE-2015-7208
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7208
26
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-137
reference_id mfsa2015-137
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-137
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2016-04
reference_id mfsa2016-04
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2016-04
29
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7208
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k1fr-d61m-b7fq
48
url VCID-k6eg-55x2-dyh5
vulnerability_id VCID-k6eg-55x2-dyh5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2731
reference_id
reference_type
scores
0
value 0.00945
scoring_system epss
scoring_elements 0.76312
published_at 2026-04-12T12:55:00Z
1
value 0.00945
scoring_system epss
scoring_elements 0.76247
published_at 2026-04-01T12:55:00Z
2
value 0.00945
scoring_system epss
scoring_elements 0.7625
published_at 2026-04-02T12:55:00Z
3
value 0.00945
scoring_system epss
scoring_elements 0.76281
published_at 2026-04-04T12:55:00Z
4
value 0.00945
scoring_system epss
scoring_elements 0.76261
published_at 2026-04-07T12:55:00Z
5
value 0.00945
scoring_system epss
scoring_elements 0.76293
published_at 2026-04-08T12:55:00Z
6
value 0.00945
scoring_system epss
scoring_elements 0.76307
published_at 2026-04-13T12:55:00Z
7
value 0.00945
scoring_system epss
scoring_elements 0.76334
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2731
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236953
reference_id 1236953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236953
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-63
reference_id mfsa2015-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-63
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2731
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6eg-55x2-dyh5
49
url VCID-kj6v-kvbx-33b5
vulnerability_id VCID-kj6v-kvbx-33b5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2740.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2740
reference_id
reference_type
scores
0
value 0.03486
scoring_system epss
scoring_elements 0.87577
published_at 2026-04-13T12:55:00Z
1
value 0.03486
scoring_system epss
scoring_elements 0.87522
published_at 2026-04-01T12:55:00Z
2
value 0.03486
scoring_system epss
scoring_elements 0.87532
published_at 2026-04-02T12:55:00Z
3
value 0.03486
scoring_system epss
scoring_elements 0.87545
published_at 2026-04-04T12:55:00Z
4
value 0.03486
scoring_system epss
scoring_elements 0.87548
published_at 2026-04-07T12:55:00Z
5
value 0.03486
scoring_system epss
scoring_elements 0.87567
published_at 2026-04-08T12:55:00Z
6
value 0.03486
scoring_system epss
scoring_elements 0.87573
published_at 2026-04-09T12:55:00Z
7
value 0.03486
scoring_system epss
scoring_elements 0.87585
published_at 2026-04-11T12:55:00Z
8
value 0.03486
scoring_system epss
scoring_elements 0.8758
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2740
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kj6v-kvbx-33b5
50
url VCID-ktts-bdwa-c7a7
vulnerability_id VCID-ktts-bdwa-c7a7
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7211.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7211.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7211
reference_id
reference_type
scores
0
value 0.0068
scoring_system epss
scoring_elements 0.71597
published_at 2026-04-12T12:55:00Z
1
value 0.0068
scoring_system epss
scoring_elements 0.71541
published_at 2026-04-01T12:55:00Z
2
value 0.0068
scoring_system epss
scoring_elements 0.71589
published_at 2026-04-09T12:55:00Z
3
value 0.0068
scoring_system epss
scoring_elements 0.71612
published_at 2026-04-11T12:55:00Z
4
value 0.0068
scoring_system epss
scoring_elements 0.71548
published_at 2026-04-02T12:55:00Z
5
value 0.0068
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-04T12:55:00Z
6
value 0.0068
scoring_system epss
scoring_elements 0.71539
published_at 2026-04-07T12:55:00Z
7
value 0.0068
scoring_system epss
scoring_elements 0.71578
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7211
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1221444
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1221444
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-141.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-141.html
9
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291589
reference_id 1291589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291589
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7211
reference_id CVE-2015-7211
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7211
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7211
reference_id CVE-2015-7211
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7211
21
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-141
reference_id mfsa2015-141
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-141
23
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7211
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ktts-bdwa-c7a7
51
url VCID-kuqd-a9t3-vyam
vulnerability_id VCID-kuqd-a9t3-vyam
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7193.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7193.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7193
reference_id
reference_type
scores
0
value 0.01267
scoring_system epss
scoring_elements 0.79461
published_at 2026-04-13T12:55:00Z
1
value 0.01267
scoring_system epss
scoring_elements 0.79412
published_at 2026-04-01T12:55:00Z
2
value 0.01267
scoring_system epss
scoring_elements 0.79488
published_at 2026-04-11T12:55:00Z
3
value 0.01267
scoring_system epss
scoring_elements 0.79471
published_at 2026-04-12T12:55:00Z
4
value 0.01267
scoring_system epss
scoring_elements 0.79419
published_at 2026-04-02T12:55:00Z
5
value 0.01267
scoring_system epss
scoring_elements 0.79442
published_at 2026-04-04T12:55:00Z
6
value 0.01267
scoring_system epss
scoring_elements 0.79429
published_at 2026-04-07T12:55:00Z
7
value 0.01267
scoring_system epss
scoring_elements 0.79457
published_at 2026-04-08T12:55:00Z
8
value 0.01267
scoring_system epss
scoring_elements 0.79466
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7193
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1210302
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1210302
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
29
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
30
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
31
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-127.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-127.html
32
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
33
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
34
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
35
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
36
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
37
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
38
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277346
reference_id 1277346
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277346
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7193
reference_id CVE-2015-7193
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7193
49
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
50
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-127
reference_id mfsa2015-127
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-127
51
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
52
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
53
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
54
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7193
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuqd-a9t3-vyam
52
url VCID-kyhs-j9aj-vqft
vulnerability_id VCID-kyhs-j9aj-vqft
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2734
reference_id
reference_type
scores
0
value 0.01252
scoring_system epss
scoring_elements 0.79343
published_at 2026-04-13T12:55:00Z
1
value 0.01252
scoring_system epss
scoring_elements 0.79293
published_at 2026-04-01T12:55:00Z
2
value 0.01252
scoring_system epss
scoring_elements 0.793
published_at 2026-04-02T12:55:00Z
3
value 0.01252
scoring_system epss
scoring_elements 0.79324
published_at 2026-04-04T12:55:00Z
4
value 0.01252
scoring_system epss
scoring_elements 0.7931
published_at 2026-04-07T12:55:00Z
5
value 0.01252
scoring_system epss
scoring_elements 0.79335
published_at 2026-04-08T12:55:00Z
6
value 0.01252
scoring_system epss
scoring_elements 0.79345
published_at 2026-04-09T12:55:00Z
7
value 0.01252
scoring_system epss
scoring_elements 0.79369
published_at 2026-04-11T12:55:00Z
8
value 0.01252
scoring_system epss
scoring_elements 0.79353
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2734
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft
53
url VCID-mry9-u9gk-4kd5
vulnerability_id VCID-mry9-u9gk-4kd5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7191
reference_id
reference_type
scores
0
value 0.00868
scoring_system epss
scoring_elements 0.7518
published_at 2026-04-12T12:55:00Z
1
value 0.00868
scoring_system epss
scoring_elements 0.75125
published_at 2026-04-01T12:55:00Z
2
value 0.00868
scoring_system epss
scoring_elements 0.75181
published_at 2026-04-09T12:55:00Z
3
value 0.00868
scoring_system epss
scoring_elements 0.75203
published_at 2026-04-11T12:55:00Z
4
value 0.00868
scoring_system epss
scoring_elements 0.75128
published_at 2026-04-02T12:55:00Z
5
value 0.00868
scoring_system epss
scoring_elements 0.75158
published_at 2026-04-04T12:55:00Z
6
value 0.00868
scoring_system epss
scoring_elements 0.75135
published_at 2026-04-07T12:55:00Z
7
value 0.00868
scoring_system epss
scoring_elements 0.75169
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7191
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1208956
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1208956
3
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-125.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-125.html
4
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
5
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7191
reference_id CVE-2015-7191
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7191
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7191
reference_id CVE-2015-7191
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7191
10
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-125
reference_id mfsa2015-125
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-125
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7191
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mry9-u9gk-4kd5
54
url VCID-mwyu-5rk2-xbbz
vulnerability_id VCID-mwyu-5rk2-xbbz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
reference_id
reference_type
scores
0
value 0.00607
scoring_system epss
scoring_elements 0.69676
published_at 2026-04-13T12:55:00Z
1
value 0.00607
scoring_system epss
scoring_elements 0.69606
published_at 2026-04-01T12:55:00Z
2
value 0.00607
scoring_system epss
scoring_elements 0.69619
published_at 2026-04-02T12:55:00Z
3
value 0.00607
scoring_system epss
scoring_elements 0.69635
published_at 2026-04-04T12:55:00Z
4
value 0.00607
scoring_system epss
scoring_elements 0.69614
published_at 2026-04-07T12:55:00Z
5
value 0.00607
scoring_system epss
scoring_elements 0.69665
published_at 2026-04-08T12:55:00Z
6
value 0.00607
scoring_system epss
scoring_elements 0.69682
published_at 2026-04-09T12:55:00Z
7
value 0.00607
scoring_system epss
scoring_elements 0.69704
published_at 2026-04-11T12:55:00Z
8
value 0.00607
scoring_system epss
scoring_elements 0.69689
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2721
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
reference_id 1236967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236967
17
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
18
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
19
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
reference_id mfsa2015-71
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-71
21
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
22
reference_url https://access.redhat.com/errata/RHSA-2015:1664
reference_id RHSA-2015:1664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1664
23
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
24
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
25
reference_url https://usn.ubuntu.com/2672-1/
reference_id USN-2672-1
reference_type
scores
url https://usn.ubuntu.com/2672-1/
26
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@3.22.2
purl pkg:ebuild/mail-client/thunderbird-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2
1
url pkg:ebuild/mail-client/thunderbird-bin@4.12
purl pkg:ebuild/mail-client/thunderbird-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12
2
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
3
url pkg:ebuild/mail-client/thunderbird-bin@38.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0
aliases CVE-2015-2721
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz
55
url VCID-mxfp-h13j-kycm
vulnerability_id VCID-mxfp-h13j-kycm
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0804.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0804
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0804
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207081
reference_id 1207081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804
reference_id CVE-2015-0804
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-39
reference_id mfsa2015-39
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-39
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0804
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxfp-h13j-kycm
56
url VCID-p7k1-93e6-cfha
vulnerability_id VCID-p7k1-93e6-cfha
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0803
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0803
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207081
reference_id 1207081
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207081
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803
reference_id CVE-2015-0803
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-39
reference_id mfsa2015-39
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-39
6
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0803
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p7k1-93e6-cfha
57
url VCID-p9g8-fq9d-5ffz
vulnerability_id VCID-p9g8-fq9d-5ffz
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7204.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7204.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7204
reference_id
reference_type
scores
0
value 0.0172
scoring_system epss
scoring_elements 0.82395
published_at 2026-04-13T12:55:00Z
1
value 0.0172
scoring_system epss
scoring_elements 0.82324
published_at 2026-04-01T12:55:00Z
2
value 0.0172
scoring_system epss
scoring_elements 0.82404
published_at 2026-04-11T12:55:00Z
3
value 0.0172
scoring_system epss
scoring_elements 0.82401
published_at 2026-04-12T12:55:00Z
4
value 0.0172
scoring_system epss
scoring_elements 0.82338
published_at 2026-04-02T12:55:00Z
5
value 0.0172
scoring_system epss
scoring_elements 0.82356
published_at 2026-04-04T12:55:00Z
6
value 0.0172
scoring_system epss
scoring_elements 0.82351
published_at 2026-04-07T12:55:00Z
7
value 0.0172
scoring_system epss
scoring_elements 0.82378
published_at 2026-04-08T12:55:00Z
8
value 0.0172
scoring_system epss
scoring_elements 0.82385
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7204
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1216130
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1216130
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-135.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-135.html
9
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291578
reference_id 1291578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291578
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:41.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:41.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:41.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7204
reference_id CVE-2015-7204
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7204
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7204
reference_id CVE-2015-7204
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7204
24
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-135
reference_id mfsa2015-135
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-135
26
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7204
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p9g8-fq9d-5ffz
58
url VCID-pbzg-cqa6-yba5
vulnerability_id VCID-pbzg-cqa6-yba5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7214.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7214.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7214
reference_id
reference_type
scores
0
value 0.15477
scoring_system epss
scoring_elements 0.94661
published_at 2026-04-13T12:55:00Z
1
value 0.15477
scoring_system epss
scoring_elements 0.94623
published_at 2026-04-01T12:55:00Z
2
value 0.15477
scoring_system epss
scoring_elements 0.94657
published_at 2026-04-11T12:55:00Z
3
value 0.15477
scoring_system epss
scoring_elements 0.9466
published_at 2026-04-12T12:55:00Z
4
value 0.15477
scoring_system epss
scoring_elements 0.9463
published_at 2026-04-02T12:55:00Z
5
value 0.15477
scoring_system epss
scoring_elements 0.94636
published_at 2026-04-04T12:55:00Z
6
value 0.15477
scoring_system epss
scoring_elements 0.94638
published_at 2026-04-07T12:55:00Z
7
value 0.15477
scoring_system epss
scoring_elements 0.94648
published_at 2026-04-08T12:55:00Z
8
value 0.15477
scoring_system epss
scoring_elements 0.94652
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7214
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1228950
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1228950
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
21
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
22
reference_url http://www.debian.org/security/2016/dsa-3432
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3432
23
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-149.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-149.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
25
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
26
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
27
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
28
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
29
reference_url http://www.ubuntu.com/usn/USN-2859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2859-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291600
reference_id 1291600
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291600
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7214
reference_id CVE-2015-7214
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7214
47
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-149
reference_id mfsa2015-149
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-149
49
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
50
reference_url https://access.redhat.com/errata/RHSA-2016:0001
reference_id RHSA-2016:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0001
51
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
52
reference_url https://usn.ubuntu.com/2859-1/
reference_id USN-2859-1
reference_type
scores
url https://usn.ubuntu.com/2859-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7214
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbzg-cqa6-yba5
59
url VCID-pdjg-gn54-9bcq
vulnerability_id VCID-pdjg-gn54-9bcq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2735.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2735.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2735
reference_id
reference_type
scores
0
value 0.01193
scoring_system epss
scoring_elements 0.78856
published_at 2026-04-13T12:55:00Z
1
value 0.01193
scoring_system epss
scoring_elements 0.78807
published_at 2026-04-01T12:55:00Z
2
value 0.01193
scoring_system epss
scoring_elements 0.78814
published_at 2026-04-02T12:55:00Z
3
value 0.01193
scoring_system epss
scoring_elements 0.78843
published_at 2026-04-04T12:55:00Z
4
value 0.01193
scoring_system epss
scoring_elements 0.78827
published_at 2026-04-07T12:55:00Z
5
value 0.01193
scoring_system epss
scoring_elements 0.78852
published_at 2026-04-08T12:55:00Z
6
value 0.01193
scoring_system epss
scoring_elements 0.78858
published_at 2026-04-09T12:55:00Z
7
value 0.01193
scoring_system epss
scoring_elements 0.78882
published_at 2026-04-11T12:55:00Z
8
value 0.01193
scoring_system epss
scoring_elements 0.78865
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2735
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
reference_id 1236956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236956
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
reference_id mfsa2015-66
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-66
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2735
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pdjg-gn54-9bcq
60
url VCID-pshp-ks3c-gbbj
vulnerability_id VCID-pshp-ks3c-gbbj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7187.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7187.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7187
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65192
published_at 2026-04-13T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65111
published_at 2026-04-01T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-11T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.6522
published_at 2026-04-12T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65161
published_at 2026-04-02T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-04T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65152
published_at 2026-04-07T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65202
published_at 2026-04-08T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65214
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7187
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1195735
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1195735
4
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-121.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-121.html
5
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
6
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
7
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277342
reference_id 1277342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277342
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187
reference_id CVE-2015-7187
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7187
reference_id CVE-2015-7187
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7187
12
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-121
reference_id mfsa2015-121
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-121
14
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7187
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pshp-ks3c-gbbj
61
url VCID-qj59-9xmk-7yg9
vulnerability_id VCID-qj59-9xmk-7yg9
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2722
reference_id
reference_type
scores
0
value 0.02313
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-13T12:55:00Z
1
value 0.02313
scoring_system epss
scoring_elements 0.84701
published_at 2026-04-01T12:55:00Z
2
value 0.02313
scoring_system epss
scoring_elements 0.84716
published_at 2026-04-02T12:55:00Z
3
value 0.02313
scoring_system epss
scoring_elements 0.84736
published_at 2026-04-04T12:55:00Z
4
value 0.02313
scoring_system epss
scoring_elements 0.84738
published_at 2026-04-07T12:55:00Z
5
value 0.02313
scoring_system epss
scoring_elements 0.8476
published_at 2026-04-08T12:55:00Z
6
value 0.02313
scoring_system epss
scoring_elements 0.84767
published_at 2026-04-09T12:55:00Z
7
value 0.02313
scoring_system epss
scoring_elements 0.84785
published_at 2026-04-11T12:55:00Z
8
value 0.02313
scoring_system epss
scoring_elements 0.8478
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2722
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
reference_id 1236955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
reference_id CVE-2015-2722
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
reference_id mfsa2015-65
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2722
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9
62
url VCID-qny5-vvv5-q7f4
vulnerability_id VCID-qny5-vvv5-q7f4
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2706
reference_id
reference_type
scores
0
value 0.01133
scoring_system epss
scoring_elements 0.78344
published_at 2026-04-13T12:55:00Z
1
value 0.01133
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-01T12:55:00Z
2
value 0.01133
scoring_system epss
scoring_elements 0.78296
published_at 2026-04-02T12:55:00Z
3
value 0.01133
scoring_system epss
scoring_elements 0.78327
published_at 2026-04-04T12:55:00Z
4
value 0.01133
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-07T12:55:00Z
5
value 0.01133
scoring_system epss
scoring_elements 0.78335
published_at 2026-04-08T12:55:00Z
6
value 0.01133
scoring_system epss
scoring_elements 0.78341
published_at 2026-04-09T12:55:00Z
7
value 0.01133
scoring_system epss
scoring_elements 0.78368
published_at 2026-04-11T12:55:00Z
8
value 0.01133
scoring_system epss
scoring_elements 0.78351
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2706
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213935
reference_id 1213935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213935
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706
reference_id CVE-2015-2706
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-45
reference_id mfsa2015-45
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-45
6
reference_url https://usn.ubuntu.com/2571-1/
reference_id USN-2571-1
reference_type
scores
url https://usn.ubuntu.com/2571-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2706
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qny5-vvv5-q7f4
63
url VCID-r1pj-wxzf-5ubj
vulnerability_id VCID-r1pj-wxzf-5ubj
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7183.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7183
reference_id
reference_type
scores
0
value 0.04702
scoring_system epss
scoring_elements 0.89359
published_at 2026-04-13T12:55:00Z
1
value 0.04702
scoring_system epss
scoring_elements 0.89317
published_at 2026-04-01T12:55:00Z
2
value 0.04702
scoring_system epss
scoring_elements 0.89366
published_at 2026-04-11T12:55:00Z
3
value 0.04702
scoring_system epss
scoring_elements 0.89363
published_at 2026-04-12T12:55:00Z
4
value 0.04702
scoring_system epss
scoring_elements 0.89323
published_at 2026-04-02T12:55:00Z
5
value 0.04702
scoring_system epss
scoring_elements 0.89335
published_at 2026-04-04T12:55:00Z
6
value 0.04702
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-07T12:55:00Z
7
value 0.04702
scoring_system epss
scoring_elements 0.89353
published_at 2026-04-08T12:55:00Z
8
value 0.04702
scoring_system epss
scoring_elements 0.89358
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7183
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
27
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
28
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
29
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
30
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
31
reference_url http://www.debian.org/security/2015/dsa-3406
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3406
32
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
33
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
34
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
35
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
36
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
37
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
38
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
39
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
40
reference_url http://www.securityfocus.com/bid/77415
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77415
41
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
42
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
43
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
44
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
45
reference_url http://www.ubuntu.com/usn/USN-2790-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2790-1
46
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269353
reference_id 1269353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269353
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7183
reference_id CVE-2015-7183
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7183
60
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
61
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
62
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
63
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
64
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
65
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
66
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
67
reference_url https://usn.ubuntu.com/2790-1/
reference_id USN-2790-1
reference_type
scores
url https://usn.ubuntu.com/2790-1/
68
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@3.22.2
purl pkg:ebuild/mail-client/thunderbird-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2
1
url pkg:ebuild/mail-client/thunderbird-bin@4.12
purl pkg:ebuild/mail-client/thunderbird-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12
2
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
3
url pkg:ebuild/mail-client/thunderbird-bin@38.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0
aliases CVE-2015-7183
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1pj-wxzf-5ubj
64
url VCID-r754-82vy-eqh1
vulnerability_id VCID-r754-82vy-eqh1
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4153
reference_id
reference_type
scores
0
value 0.4589
scoring_system epss
scoring_elements 0.97605
published_at 2026-04-01T12:55:00Z
1
value 0.4589
scoring_system epss
scoring_elements 0.97611
published_at 2026-04-02T12:55:00Z
2
value 0.4589
scoring_system epss
scoring_elements 0.97613
published_at 2026-04-04T12:55:00Z
3
value 0.4589
scoring_system epss
scoring_elements 0.97614
published_at 2026-04-07T12:55:00Z
4
value 0.4589
scoring_system epss
scoring_elements 0.97619
published_at 2026-04-08T12:55:00Z
5
value 0.4589
scoring_system epss
scoring_elements 0.97622
published_at 2026-04-09T12:55:00Z
6
value 0.4589
scoring_system epss
scoring_elements 0.97624
published_at 2026-04-11T12:55:00Z
7
value 0.4589
scoring_system epss
scoring_elements 0.97626
published_at 2026-04-12T12:55:00Z
8
value 0.4589
scoring_system epss
scoring_elements 0.97627
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4153
1
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/37200.txt
reference_id CVE-2015-4465;OSVDB-122910;CVE-2015-4153
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/37200.txt
2
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-4153
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r754-82vy-eqh1
65
url VCID-rg6a-eu1e-ruar
vulnerability_id VCID-rg6a-eu1e-ruar
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4515.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4515.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4515
reference_id
reference_type
scores
0
value 0.0044
scoring_system epss
scoring_elements 0.63174
published_at 2026-04-13T12:55:00Z
1
value 0.0044
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-01T12:55:00Z
2
value 0.0044
scoring_system epss
scoring_elements 0.63227
published_at 2026-04-11T12:55:00Z
3
value 0.0044
scoring_system epss
scoring_elements 0.63211
published_at 2026-04-12T12:55:00Z
4
value 0.0044
scoring_system epss
scoring_elements 0.63145
published_at 2026-04-02T12:55:00Z
5
value 0.0044
scoring_system epss
scoring_elements 0.63175
published_at 2026-04-04T12:55:00Z
6
value 0.0044
scoring_system epss
scoring_elements 0.6314
published_at 2026-04-07T12:55:00Z
7
value 0.0044
scoring_system epss
scoring_elements 0.63192
published_at 2026-04-08T12:55:00Z
8
value 0.0044
scoring_system epss
scoring_elements 0.63209
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4515
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1046421
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1046421
4
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-117.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-117.html
5
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
6
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
7
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277337
reference_id 1277337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277337
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515
reference_id CVE-2015-4515
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4515
reference_id CVE-2015-4515
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-4515
12
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-117
reference_id mfsa2015-117
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-117
14
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-4515
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg6a-eu1e-ruar
66
url VCID-rzqy-gheq-cqgg
vulnerability_id VCID-rzqy-gheq-cqgg
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
reference_id
reference_type
scores
0
value 0.93743
scoring_system epss
scoring_elements 0.99851
published_at 2026-04-07T12:55:00Z
1
value 0.93894
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-08T12:55:00Z
2
value 0.93894
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-09T12:55:00Z
3
value 0.939
scoring_system epss
scoring_elements 0.99876
published_at 2026-04-13T12:55:00Z
4
value 0.939
scoring_system epss
scoring_elements 0.99873
published_at 2026-04-01T12:55:00Z
5
value 0.939
scoring_system epss
scoring_elements 0.99874
published_at 2026-04-02T12:55:00Z
6
value 0.939
scoring_system epss
scoring_elements 0.99875
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
47
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
reference_id 1223211
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223211
49
reference_url https://security.gentoo.org/glsa/201506-02
reference_id GLSA-201506-02
reference_type
scores
url https://security.gentoo.org/glsa/201506-02
50
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
51
reference_url https://security.gentoo.org/glsa/201603-11
reference_id GLSA-201603-11
reference_type
scores
url https://security.gentoo.org/glsa/201603-11
52
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
53
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
54
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
reference_id mfsa2015-70
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-70
55
reference_url https://access.redhat.com/errata/RHSA-2015:1072
reference_id RHSA-2015:1072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1072
56
reference_url https://access.redhat.com/errata/RHSA-2015:1185
reference_id RHSA-2015:1185
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1185
57
reference_url https://access.redhat.com/errata/RHSA-2015:1197
reference_id RHSA-2015:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1197
58
reference_url https://access.redhat.com/errata/RHSA-2015:1228
reference_id RHSA-2015:1228
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1228
59
reference_url https://access.redhat.com/errata/RHSA-2015:1229
reference_id RHSA-2015:1229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1229
60
reference_url https://access.redhat.com/errata/RHSA-2015:1230
reference_id RHSA-2015:1230
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1230
61
reference_url https://access.redhat.com/errata/RHSA-2015:1241
reference_id RHSA-2015:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1241
62
reference_url https://access.redhat.com/errata/RHSA-2015:1242
reference_id RHSA-2015:1242
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1242
63
reference_url https://access.redhat.com/errata/RHSA-2015:1243
reference_id RHSA-2015:1243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1243
64
reference_url https://access.redhat.com/errata/RHSA-2015:1485
reference_id RHSA-2015:1485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1485
65
reference_url https://access.redhat.com/errata/RHSA-2015:1486
reference_id RHSA-2015:1486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1486
66
reference_url https://access.redhat.com/errata/RHSA-2015:1488
reference_id RHSA-2015:1488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1488
67
reference_url https://access.redhat.com/errata/RHSA-2015:1526
reference_id RHSA-2015:1526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1526
68
reference_url https://access.redhat.com/errata/RHSA-2015:1544
reference_id RHSA-2015:1544
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1544
69
reference_url https://access.redhat.com/errata/RHSA-2015:1604
reference_id RHSA-2015:1604
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1604
70
reference_url https://access.redhat.com/errata/RHSA-2016:2056
reference_id RHSA-2016:2056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2056
71
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
72
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
73
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
74
reference_url https://usn.ubuntu.com/2696-1/
reference_id USN-2696-1
reference_type
scores
url https://usn.ubuntu.com/2696-1/
75
reference_url https://usn.ubuntu.com/2706-1/
reference_id USN-2706-1
reference_type
scores
url https://usn.ubuntu.com/2706-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@3.22.2
purl pkg:ebuild/mail-client/thunderbird-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2
1
url pkg:ebuild/mail-client/thunderbird-bin@4.12
purl pkg:ebuild/mail-client/thunderbird-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12
2
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
3
url pkg:ebuild/mail-client/thunderbird-bin@38.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0
aliases CVE-2015-4000
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg
67
url VCID-se7j-tewy-4uah
vulnerability_id VCID-se7j-tewy-4uah
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2733.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2733.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2733
reference_id
reference_type
scores
0
value 0.02666
scoring_system epss
scoring_elements 0.85798
published_at 2026-04-13T12:55:00Z
1
value 0.02666
scoring_system epss
scoring_elements 0.85724
published_at 2026-04-01T12:55:00Z
2
value 0.02666
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-02T12:55:00Z
3
value 0.02666
scoring_system epss
scoring_elements 0.85755
published_at 2026-04-04T12:55:00Z
4
value 0.02666
scoring_system epss
scoring_elements 0.85761
published_at 2026-04-07T12:55:00Z
5
value 0.02666
scoring_system epss
scoring_elements 0.8578
published_at 2026-04-08T12:55:00Z
6
value 0.02666
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-09T12:55:00Z
7
value 0.02666
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-11T12:55:00Z
8
value 0.02666
scoring_system epss
scoring_elements 0.85802
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2733
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
reference_id 1236955
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236955
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733
reference_id CVE-2015-2733
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
reference_id mfsa2015-65
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-65
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
8
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2733
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-se7j-tewy-4uah
68
url VCID-t6bj-g9k6-23cq
vulnerability_id VCID-t6bj-g9k6-23cq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7217.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7217.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7217
reference_id
reference_type
scores
0
value 0.01302
scoring_system epss
scoring_elements 0.79738
published_at 2026-04-13T12:55:00Z
1
value 0.01302
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-01T12:55:00Z
2
value 0.01302
scoring_system epss
scoring_elements 0.7976
published_at 2026-04-11T12:55:00Z
3
value 0.01302
scoring_system epss
scoring_elements 0.79744
published_at 2026-04-12T12:55:00Z
4
value 0.01302
scoring_system epss
scoring_elements 0.79696
published_at 2026-04-02T12:55:00Z
5
value 0.01302
scoring_system epss
scoring_elements 0.79718
published_at 2026-04-04T12:55:00Z
6
value 0.01302
scoring_system epss
scoring_elements 0.79703
published_at 2026-04-07T12:55:00Z
7
value 0.01302
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-08T12:55:00Z
8
value 0.01302
scoring_system epss
scoring_elements 0.79739
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7217
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1203078
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1203078
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-143.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-143.html
9
reference_url http://www.securityfocus.com/bid/79278
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79278
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291591
reference_id 1291591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291591
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7217
reference_id CVE-2015-7217
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7217
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7217
reference_id CVE-2015-7217
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7217
22
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-143
reference_id mfsa2015-143
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-143
24
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7217
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6bj-g9k6-23cq
69
url VCID-ua69-cwm3-8ubh
vulnerability_id VCID-ua69-cwm3-8ubh
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2741
reference_id
reference_type
scores
0
value 0.00426
scoring_system epss
scoring_elements 0.62257
published_at 2026-04-13T12:55:00Z
1
value 0.00426
scoring_system epss
scoring_elements 0.62147
published_at 2026-04-01T12:55:00Z
2
value 0.00426
scoring_system epss
scoring_elements 0.62207
published_at 2026-04-02T12:55:00Z
3
value 0.00426
scoring_system epss
scoring_elements 0.62237
published_at 2026-04-04T12:55:00Z
4
value 0.00426
scoring_system epss
scoring_elements 0.62204
published_at 2026-04-07T12:55:00Z
5
value 0.00426
scoring_system epss
scoring_elements 0.62254
published_at 2026-04-08T12:55:00Z
6
value 0.00426
scoring_system epss
scoring_elements 0.62271
published_at 2026-04-09T12:55:00Z
7
value 0.00426
scoring_system epss
scoring_elements 0.62289
published_at 2026-04-11T12:55:00Z
8
value 0.00426
scoring_system epss
scoring_elements 0.62279
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2741
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236963
reference_id 1236963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236963
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741
reference_id CVE-2015-2741
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741
4
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-67
reference_id mfsa2015-67
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-67
6
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
7
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
8
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
9
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2741
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ua69-cwm3-8ubh
70
url VCID-v213-2wvj-effu
vulnerability_id VCID-v213-2wvj-effu
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7218.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7218.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7218
reference_id
reference_type
scores
0
value 0.01259
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-13T12:55:00Z
1
value 0.01259
scoring_system epss
scoring_elements 0.79352
published_at 2026-04-01T12:55:00Z
2
value 0.01259
scoring_system epss
scoring_elements 0.79426
published_at 2026-04-11T12:55:00Z
3
value 0.01259
scoring_system epss
scoring_elements 0.7941
published_at 2026-04-12T12:55:00Z
4
value 0.01259
scoring_system epss
scoring_elements 0.79359
published_at 2026-04-02T12:55:00Z
5
value 0.01259
scoring_system epss
scoring_elements 0.79381
published_at 2026-04-04T12:55:00Z
6
value 0.01259
scoring_system epss
scoring_elements 0.79367
published_at 2026-04-07T12:55:00Z
7
value 0.01259
scoring_system epss
scoring_elements 0.79394
published_at 2026-04-08T12:55:00Z
8
value 0.01259
scoring_system epss
scoring_elements 0.79403
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7218
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1194818
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1194818
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-142.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-142.html
9
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291590
reference_id 1291590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291590
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218
reference_id CVE-2015-7218
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7218
reference_id CVE-2015-7218
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7218
21
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-142
reference_id mfsa2015-142
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-142
23
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7218
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v213-2wvj-effu
71
url VCID-vu6n-xcq7-1ya5
vulnerability_id VCID-vu6n-xcq7-1ya5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7203.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7203.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7203
reference_id
reference_type
scores
0
value 0.01662
scoring_system epss
scoring_elements 0.8207
published_at 2026-04-13T12:55:00Z
1
value 0.01662
scoring_system epss
scoring_elements 0.82006
published_at 2026-04-01T12:55:00Z
2
value 0.01662
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-11T12:55:00Z
3
value 0.01662
scoring_system epss
scoring_elements 0.82078
published_at 2026-04-12T12:55:00Z
4
value 0.01662
scoring_system epss
scoring_elements 0.82018
published_at 2026-04-02T12:55:00Z
5
value 0.01662
scoring_system epss
scoring_elements 0.8204
published_at 2026-04-04T12:55:00Z
6
value 0.01662
scoring_system epss
scoring_elements 0.82034
published_at 2026-04-07T12:55:00Z
7
value 0.01662
scoring_system epss
scoring_elements 0.82061
published_at 2026-04-08T12:55:00Z
8
value 0.01662
scoring_system epss
scoring_elements 0.82068
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7203
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1201183
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1201183
8
reference_url https://hg.mozilla.org/mozilla-central/rev/e1bcc04808cc
reference_id
reference_type
scores
url https://hg.mozilla.org/mozilla-central/rev/e1bcc04808cc
9
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-144.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-144.html
10
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
11
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
12
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291593
reference_id 1291593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291593
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7203
reference_id CVE-2015-7203
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7203
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7203
reference_id CVE-2015-7203
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7203
22
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-144
reference_id mfsa2015-144
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-144
24
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7203
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu6n-xcq7-1ya5
72
url VCID-wh23-7b49-n3g5
vulnerability_id VCID-wh23-7b49-n3g5
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0813
reference_id
reference_type
scores
0
value 0.02842
scoring_system epss
scoring_elements 0.86206
published_at 2026-04-13T12:55:00Z
1
value 0.02842
scoring_system epss
scoring_elements 0.86142
published_at 2026-04-01T12:55:00Z
2
value 0.02842
scoring_system epss
scoring_elements 0.86152
published_at 2026-04-02T12:55:00Z
3
value 0.02842
scoring_system epss
scoring_elements 0.86168
published_at 2026-04-07T12:55:00Z
4
value 0.02842
scoring_system epss
scoring_elements 0.86187
published_at 2026-04-08T12:55:00Z
5
value 0.02842
scoring_system epss
scoring_elements 0.86199
published_at 2026-04-09T12:55:00Z
6
value 0.02842
scoring_system epss
scoring_elements 0.86213
published_at 2026-04-11T12:55:00Z
7
value 0.02842
scoring_system epss
scoring_elements 0.8621
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207088
reference_id 1207088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207088
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-31
reference_id mfsa2015-31
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-31
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0813
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh23-7b49-n3g5
73
url VCID-wmk8-kk5t-ufdd
vulnerability_id VCID-wmk8-kk5t-ufdd
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2742
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.68153
published_at 2026-04-13T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.6809
published_at 2026-04-01T12:55:00Z
2
value 0.00556
scoring_system epss
scoring_elements 0.68112
published_at 2026-04-02T12:55:00Z
3
value 0.00556
scoring_system epss
scoring_elements 0.68131
published_at 2026-04-04T12:55:00Z
4
value 0.00556
scoring_system epss
scoring_elements 0.68108
published_at 2026-04-07T12:55:00Z
5
value 0.00556
scoring_system epss
scoring_elements 0.68159
published_at 2026-04-08T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.68174
published_at 2026-04-09T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68199
published_at 2026-04-11T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.68186
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2742
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742
reference_id CVE-2015-2742
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2742
2
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-68
reference_id mfsa2015-68
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-68
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2742
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wmk8-kk5t-ufdd
74
url VCID-wtg7-p8my-mufn
vulnerability_id VCID-wtg7-p8my-mufn
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7216.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7216.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7216
reference_id
reference_type
scores
0
value 0.00892
scoring_system epss
scoring_elements 0.75563
published_at 2026-04-13T12:55:00Z
1
value 0.00892
scoring_system epss
scoring_elements 0.75497
published_at 2026-04-01T12:55:00Z
2
value 0.00892
scoring_system epss
scoring_elements 0.75589
published_at 2026-04-11T12:55:00Z
3
value 0.00892
scoring_system epss
scoring_elements 0.75569
published_at 2026-04-12T12:55:00Z
4
value 0.00892
scoring_system epss
scoring_elements 0.755
published_at 2026-04-02T12:55:00Z
5
value 0.00892
scoring_system epss
scoring_elements 0.75531
published_at 2026-04-04T12:55:00Z
6
value 0.00892
scoring_system epss
scoring_elements 0.75511
published_at 2026-04-07T12:55:00Z
7
value 0.00892
scoring_system epss
scoring_elements 0.75554
published_at 2026-04-08T12:55:00Z
8
value 0.00892
scoring_system epss
scoring_elements 0.75564
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7216
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1197059
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1197059
8
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-143.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-143.html
9
reference_url http://www.securityfocus.com/bid/79278
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79278
10
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
11
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291591
reference_id 1291591
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291591
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome:-:*:linux:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7216
reference_id CVE-2015-7216
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7216
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7216
reference_id CVE-2015-7216
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7216
22
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-143
reference_id mfsa2015-143
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-143
24
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7216
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wtg7-p8my-mufn
75
url VCID-xf3p-h83v-vyhv
vulnerability_id VCID-xf3p-h83v-vyhv
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7221.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7221.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7221
reference_id
reference_type
scores
0
value 0.01483
scoring_system epss
scoring_elements 0.81007
published_at 2026-04-13T12:55:00Z
1
value 0.01483
scoring_system epss
scoring_elements 0.80946
published_at 2026-04-01T12:55:00Z
2
value 0.01483
scoring_system epss
scoring_elements 0.81028
published_at 2026-04-11T12:55:00Z
3
value 0.01483
scoring_system epss
scoring_elements 0.81015
published_at 2026-04-12T12:55:00Z
4
value 0.01483
scoring_system epss
scoring_elements 0.80955
published_at 2026-04-02T12:55:00Z
5
value 0.01483
scoring_system epss
scoring_elements 0.80978
published_at 2026-04-04T12:55:00Z
6
value 0.01483
scoring_system epss
scoring_elements 0.80976
published_at 2026-04-07T12:55:00Z
7
value 0.01483
scoring_system epss
scoring_elements 0.81005
published_at 2026-04-08T12:55:00Z
8
value 0.01483
scoring_system epss
scoring_elements 0.81012
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7221
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1199400
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1199400
8
reference_url https://hg.mozilla.org/mozilla-central/rev/7fd961937687
reference_id
reference_type
scores
url https://hg.mozilla.org/mozilla-central/rev/7fd961937687
9
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-144.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-144.html
10
reference_url http://www.securityfocus.com/bid/79280
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79280
11
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
12
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291593
reference_id 1291593
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291593
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7221
reference_id CVE-2015-7221
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7221
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7221
reference_id CVE-2015-7221
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7221
22
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
23
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-144
reference_id mfsa2015-144
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-144
24
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7221
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xf3p-h83v-vyhv
76
url VCID-xjf8-mc7t-hfah
vulnerability_id VCID-xjf8-mc7t-hfah
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2724
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75855
published_at 2026-04-13T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75798
published_at 2026-04-01T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75802
published_at 2026-04-02T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75835
published_at 2026-04-04T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75813
published_at 2026-04-07T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75845
published_at 2026-04-08T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75857
published_at 2026-04-09T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-11T12:55:00Z
8
value 0.00912
scoring_system epss
scoring_elements 0.75862
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
reference_id 1236947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236947
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
reference_id mfsa2015-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-59
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://access.redhat.com/errata/RHSA-2015:1455
reference_id RHSA-2015:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1455
20
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
21
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
22
reference_url https://usn.ubuntu.com/2673-1/
reference_id USN-2673-1
reference_type
scores
url https://usn.ubuntu.com/2673-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2724
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah
77
url VCID-xnen-brn4-vqgp
vulnerability_id VCID-xnen-brn4-vqgp
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7194.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7194.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7194
reference_id
reference_type
scores
0
value 0.02607
scoring_system epss
scoring_elements 0.8563
published_at 2026-04-13T12:55:00Z
1
value 0.02607
scoring_system epss
scoring_elements 0.85558
published_at 2026-04-01T12:55:00Z
2
value 0.02607
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-11T12:55:00Z
3
value 0.02607
scoring_system epss
scoring_elements 0.85634
published_at 2026-04-12T12:55:00Z
4
value 0.02607
scoring_system epss
scoring_elements 0.8557
published_at 2026-04-02T12:55:00Z
5
value 0.02607
scoring_system epss
scoring_elements 0.85588
published_at 2026-04-04T12:55:00Z
6
value 0.02607
scoring_system epss
scoring_elements 0.85592
published_at 2026-04-07T12:55:00Z
7
value 0.02607
scoring_system epss
scoring_elements 0.85612
published_at 2026-04-08T12:55:00Z
8
value 0.02607
scoring_system epss
scoring_elements 0.85623
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7194
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1211262
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1211262
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
28
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
29
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
30
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-128.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-128.html
31
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
32
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
33
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
34
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
35
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
36
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277347
reference_id 1277347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277347
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7194
reference_id CVE-2015-7194
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7194
48
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
49
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-128
reference_id mfsa2015-128
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-128
50
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
51
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
52
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7194
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xnen-brn4-vqgp
78
url VCID-xqxf-cnpj-3qas
vulnerability_id VCID-xqxf-cnpj-3qas
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2728
reference_id
reference_type
scores
0
value 0.01072
scoring_system epss
scoring_elements 0.7775
published_at 2026-04-13T12:55:00Z
1
value 0.01072
scoring_system epss
scoring_elements 0.7769
published_at 2026-04-01T12:55:00Z
2
value 0.01072
scoring_system epss
scoring_elements 0.77697
published_at 2026-04-02T12:55:00Z
3
value 0.01072
scoring_system epss
scoring_elements 0.77724
published_at 2026-04-04T12:55:00Z
4
value 0.01072
scoring_system epss
scoring_elements 0.77707
published_at 2026-04-07T12:55:00Z
5
value 0.01072
scoring_system epss
scoring_elements 0.77735
published_at 2026-04-08T12:55:00Z
6
value 0.01072
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-09T12:55:00Z
7
value 0.01072
scoring_system epss
scoring_elements 0.77766
published_at 2026-04-11T12:55:00Z
8
value 0.01072
scoring_system epss
scoring_elements 0.77751
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2728
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1236951
reference_id 1236951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1236951
16
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-61
reference_id mfsa2015-61
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-61
18
reference_url https://access.redhat.com/errata/RHSA-2015:1207
reference_id RHSA-2015:1207
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1207
19
reference_url https://usn.ubuntu.com/2656-1/
reference_id USN-2656-1
reference_type
scores
url https://usn.ubuntu.com/2656-1/
20
reference_url https://usn.ubuntu.com/2656-2/
reference_id USN-2656-2
reference_type
scores
url https://usn.ubuntu.com/2656-2/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-2728
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas
79
url VCID-ycdw-d6fb-9fa6
vulnerability_id VCID-ycdw-d6fb-9fa6
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174083.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174253.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00022.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00023.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00038.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00049.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00104.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2015-2657.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2657.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7213.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7213.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7213
reference_id
reference_type
scores
0
value 0.02438
scoring_system epss
scoring_elements 0.85168
published_at 2026-04-13T12:55:00Z
1
value 0.02438
scoring_system epss
scoring_elements 0.85098
published_at 2026-04-01T12:55:00Z
2
value 0.02438
scoring_system epss
scoring_elements 0.85174
published_at 2026-04-11T12:55:00Z
3
value 0.02438
scoring_system epss
scoring_elements 0.85172
published_at 2026-04-12T12:55:00Z
4
value 0.02438
scoring_system epss
scoring_elements 0.8511
published_at 2026-04-02T12:55:00Z
5
value 0.02438
scoring_system epss
scoring_elements 0.85128
published_at 2026-04-04T12:55:00Z
6
value 0.02438
scoring_system epss
scoring_elements 0.85131
published_at 2026-04-07T12:55:00Z
7
value 0.02438
scoring_system epss
scoring_elements 0.85152
published_at 2026-04-08T12:55:00Z
8
value 0.02438
scoring_system epss
scoring_elements 0.8516
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7213
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1206211
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1206211
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222
21
reference_url http://www.debian.org/security/2015/dsa-3422
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3422
22
reference_url http://www.debian.org/security/2016/dsa-3432
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3432
23
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-146.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-146.html
24
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
25
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
26
reference_url http://www.securityfocus.com/bid/79279
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79279
27
reference_url http://www.securitytracker.com/id/1034426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034426
28
reference_url http://www.ubuntu.com/usn/USN-2833-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2833-1
29
reference_url http://www.ubuntu.com/usn/USN-2859-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2859-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291596
reference_id 1291596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291596
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x64:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:x64:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7213
reference_id CVE-2015-7213
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7213
47
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
48
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-146
reference_id mfsa2015-146
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-146
49
reference_url https://access.redhat.com/errata/RHSA-2015:2657
reference_id RHSA-2015:2657
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2657
50
reference_url https://access.redhat.com/errata/RHSA-2016:0001
reference_id RHSA-2016:0001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0001
51
reference_url https://usn.ubuntu.com/2833-1/
reference_id USN-2833-1
reference_type
scores
url https://usn.ubuntu.com/2833-1/
52
reference_url https://usn.ubuntu.com/2859-1/
reference_id USN-2859-1
reference_type
scores
url https://usn.ubuntu.com/2859-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-7213
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycdw-d6fb-9fa6
80
url VCID-yq8w-7uvd-dyhk
vulnerability_id VCID-yq8w-7uvd-dyhk
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0810
reference_id
reference_type
scores
0
value 0.00396
scoring_system epss
scoring_elements 0.60445
published_at 2026-04-13T12:55:00Z
1
value 0.00396
scoring_system epss
scoring_elements 0.60323
published_at 2026-04-01T12:55:00Z
2
value 0.00396
scoring_system epss
scoring_elements 0.60398
published_at 2026-04-02T12:55:00Z
3
value 0.00396
scoring_system epss
scoring_elements 0.60426
published_at 2026-04-04T12:55:00Z
4
value 0.00396
scoring_system epss
scoring_elements 0.60393
published_at 2026-04-07T12:55:00Z
5
value 0.00396
scoring_system epss
scoring_elements 0.60442
published_at 2026-04-08T12:55:00Z
6
value 0.00396
scoring_system epss
scoring_elements 0.60459
published_at 2026-04-09T12:55:00Z
7
value 0.00396
scoring_system epss
scoring_elements 0.60479
published_at 2026-04-11T12:55:00Z
8
value 0.00396
scoring_system epss
scoring_elements 0.60465
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0810
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810
reference_id CVE-2015-0810
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810
2
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-35
reference_id mfsa2015-35
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-35
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0810
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq8w-7uvd-dyhk
81
url VCID-ys1x-t7un-ayhr
vulnerability_id VCID-ys1x-t7un-ayhr
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0807
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33519
published_at 2026-04-13T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33485
published_at 2026-04-01T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33639
published_at 2026-04-02T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33673
published_at 2026-04-04T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33512
published_at 2026-04-07T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33556
published_at 2026-04-08T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.3359
published_at 2026-04-09T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33584
published_at 2026-04-11T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33543
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207076
reference_id 1207076
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207076
8
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-37
reference_id mfsa2015-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-37
10
reference_url https://access.redhat.com/errata/RHSA-2015:0766
reference_id RHSA-2015:0766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0766
11
reference_url https://access.redhat.com/errata/RHSA-2015:0771
reference_id RHSA-2015:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0771
12
reference_url https://usn.ubuntu.com/2550-1/
reference_id USN-2550-1
reference_type
scores
url https://usn.ubuntu.com/2550-1/
13
reference_url https://usn.ubuntu.com/2552-1/
reference_id USN-2552-1
reference_type
scores
url https://usn.ubuntu.com/2552-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-0807
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr
82
url VCID-z26z-btvf-x7eq
vulnerability_id VCID-z26z-btvf-x7eq
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-1980.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1980.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2015-1981.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1981.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7182.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7182
reference_id
reference_type
scores
0
value 0.11044
scoring_system epss
scoring_elements 0.9344
published_at 2026-04-13T12:55:00Z
1
value 0.11044
scoring_system epss
scoring_elements 0.93405
published_at 2026-04-01T12:55:00Z
2
value 0.11044
scoring_system epss
scoring_elements 0.93433
published_at 2026-04-09T12:55:00Z
3
value 0.11044
scoring_system epss
scoring_elements 0.93438
published_at 2026-04-11T12:55:00Z
4
value 0.11044
scoring_system epss
scoring_elements 0.93439
published_at 2026-04-12T12:55:00Z
5
value 0.11044
scoring_system epss
scoring_elements 0.93413
published_at 2026-04-02T12:55:00Z
6
value 0.11044
scoring_system epss
scoring_elements 0.93421
published_at 2026-04-07T12:55:00Z
7
value 0.11044
scoring_system epss
scoring_elements 0.93429
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7182
12
reference_url https://bto.bluecoat.com/security-advisory/sa119
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa119
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
34
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
35
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
36
reference_url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
37
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
38
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
39
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
40
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
41
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
42
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
43
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
44
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
45
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
46
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
47
reference_url http://www.securityfocus.com/bid/77416
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77416
48
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
49
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
50
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.399753
51
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
52
reference_url http://www.ubuntu.com/usn/USN-2791-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2791-1
53
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
54
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1269351
reference_id 1269351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1269351
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:3.20.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:opensso:3.0-0.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7182
reference_id CVE-2015-7182
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7182
73
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
74
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
75
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
reference_id mfsa2015-133
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-133
76
reference_url https://access.redhat.com/errata/RHSA-2015:1980
reference_id RHSA-2015:1980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1980
77
reference_url https://access.redhat.com/errata/RHSA-2015:1981
reference_id RHSA-2015:1981
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1981
78
reference_url https://access.redhat.com/errata/RHSA-2015:2068
reference_id RHSA-2015:2068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2068
79
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
80
reference_url https://usn.ubuntu.com/2791-1/
reference_id USN-2791-1
reference_type
scores
url https://usn.ubuntu.com/2791-1/
81
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@3.22.2
purl pkg:ebuild/mail-client/thunderbird-bin@3.22.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@3.22.2
1
url pkg:ebuild/mail-client/thunderbird-bin@4.12
purl pkg:ebuild/mail-client/thunderbird-bin@4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@4.12
2
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
3
url pkg:ebuild/mail-client/thunderbird-bin@38.7.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.7.0
aliases CVE-2015-7182
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z26z-btvf-x7eq
83
url VCID-zhyg-avrd-z7gu
vulnerability_id VCID-zhyg-avrd-z7gu
summary
Multiple vulnerabilities have been found in Mozilla Firefox and
    Thunderbird, the worst of which may allow user-assisted execution of
    arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00013.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00020.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00021.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00037.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00049.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2015-1982.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1982.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2015-2519.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2519.html
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4513.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4513
reference_id
reference_type
scores
0
value 0.02015
scoring_system epss
scoring_elements 0.8373
published_at 2026-04-13T12:55:00Z
1
value 0.02015
scoring_system epss
scoring_elements 0.83664
published_at 2026-04-01T12:55:00Z
2
value 0.02015
scoring_system epss
scoring_elements 0.83741
published_at 2026-04-11T12:55:00Z
3
value 0.02015
scoring_system epss
scoring_elements 0.83734
published_at 2026-04-12T12:55:00Z
4
value 0.02015
scoring_system epss
scoring_elements 0.83677
published_at 2026-04-02T12:55:00Z
5
value 0.02015
scoring_system epss
scoring_elements 0.83692
published_at 2026-04-04T12:55:00Z
6
value 0.02015
scoring_system epss
scoring_elements 0.83694
published_at 2026-04-07T12:55:00Z
7
value 0.02015
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-08T12:55:00Z
8
value 0.02015
scoring_system epss
scoring_elements 0.83725
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4513
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1107011
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1107011
12
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1191942
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1191942
13
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1193038
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1193038
14
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1204580
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1204580
15
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1204669
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1204669
16
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1204700
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1204700
17
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1205707
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1205707
18
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1206564
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1206564
19
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1208665
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1208665
20
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1209471
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1209471
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1213979
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1213979
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200
39
reference_url http://www.debian.org/security/2015/dsa-3393
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3393
40
reference_url http://www.debian.org/security/2015/dsa-3410
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3410
41
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-116.html
42
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
43
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
44
reference_url http://www.securityfocus.com/bid/77411
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77411
45
reference_url http://www.securitytracker.com/id/1034069
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034069
46
reference_url http://www.ubuntu.com/usn/USN-2785-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2785-1
47
reference_url http://www.ubuntu.com/usn/USN-2819-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2819-1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277332
reference_id 1277332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277332
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-4513
reference_id CVE-2015-4513
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-4513
59
reference_url https://security.gentoo.org/glsa/201512-10
reference_id GLSA-201512-10
reference_type
scores
url https://security.gentoo.org/glsa/201512-10
60
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-116
reference_id mfsa2015-116
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-116
61
reference_url https://access.redhat.com/errata/RHSA-2015:1982
reference_id RHSA-2015:1982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1982
62
reference_url https://access.redhat.com/errata/RHSA-2015:2519
reference_id RHSA-2015:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2519
63
reference_url https://usn.ubuntu.com/2785-1/
reference_id USN-2785-1
reference_type
scores
url https://usn.ubuntu.com/2785-1/
64
reference_url https://usn.ubuntu.com/2819-1/
reference_id USN-2819-1
reference_type
scores
url https://usn.ubuntu.com/2819-1/
fixed_packages
0
url pkg:ebuild/mail-client/thunderbird-bin@38.5.0
purl pkg:ebuild/mail-client/thunderbird-bin@38.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0
aliases CVE-2015-4513
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zhyg-avrd-z7gu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@38.5.0